Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-09-01GdataKarsten Hahn
DLL Fixer leads to Cyrat Ransomware
Cyrat
2020-08-31IndeChris Campbell
Analysis of the latest wave of Emotet malicious documents
Emotet
2020-08-31SymantecThreat Hunter Team
Sophisticated Groups and Cyber Criminals Set Sights on Lucrative Financial Sector
WastedLocker
2020-08-31Github (ics-iot-bootcamp)Ali Rıza Şahinkaya, Can Atakan Işık, Rıdvan Ethem Canavar
Cerberus Banking Trojan Research
Cerberus
2020-08-31CrowdStrikeAlex Orleans
Who Is PIONEER KITTEN?
Fox Kitten
2020-08-31Andrew Ivanov
XP10 Ransomware
XP10
2020-08-31JPCERT/CCShusei Tomonaga
Malware Used by Lazarus after Network Intrusion
Lazarus Group
2020-08-31SentinelOneJim Walter
The BLINDINGCAN RAT and Malicious North Korean Activity
BLINDINGCAN
2020-08-31NetlabGenShen Ye, Yanlong Ma, Ye Jin
In the wild QNAP NAS attacks
2020-08-31The DFIR ReportThe DFIR Report
NetWalker Ransomware in 1 Hour
Cobalt Strike Mailto MimiKatz
2020-08-31cyber.wtf blogLuca Ebach
Trickbot rdpscanDll – Transforming Candidate Credentials for Brute-Forcing RDP Servers
TrickBot
2020-08-31JPCERT/CCShusei Tomonaga
Malware used by the attack group Lazarus after network intrusion
2020-08-30Andrew Ivanov
Z3 Ransomware
Z3
2020-08-29AguinetAdrien Guinet
Emulating NotPetya bootloader with Miasm
EternalPetya
2020-08-28CYBERWISEAli Rıza Şahinkaya, Can Atakan Işık, Rıdvan Ethem Canavar
Cerberus Banking Trojan Analysis
Cerberus
2020-08-28NTTFumio Ozawa, Rintaro Koike, Shogo Hayashi
Operation Lagtime IT: Colourful Panda Footprint
Cotx RAT Poison Ivy TA428
2020-08-28McAfeeMcAfee
MVISION Insights: Wastedlocker Ransomware
WastedLocker
2020-08-28360 Core Security360威胁情报中心
The "sneak camera" in mobile pornography software
2020-08-28CheckpointCheck Point Research
Gozi: The Malware with a Thousand Faces
DreamBot ISFB LOLSnif SaiGon
2020-08-28White OpsSatori Threat Intelligence & Research team
TERRACOTTA Android Malware: A Technical Study