Click here to download all references as Bib-File.•
2020-09-01
⋅
Gdata
⋅
DLL Fixer leads to Cyrat Ransomware Cyrat |
2020-08-31
⋅
Inde
⋅
Analysis of the latest wave of Emotet malicious documents Emotet |
2020-08-31
⋅
Symantec
⋅
Sophisticated Groups and Cyber Criminals Set Sights on Lucrative Financial Sector WastedLocker |
2020-08-31
⋅
Github (ics-iot-bootcamp)
⋅
Cerberus Banking Trojan Research Cerberus |
2020-08-31
⋅
CrowdStrike
⋅
Who Is PIONEER KITTEN? Fox Kitten |
2020-08-31
⋅
⋅
XP10 Ransomware XP10 |
2020-08-31
⋅
JPCERT/CC
⋅
Malware Used by Lazarus after Network Intrusion Lazarus Group |
2020-08-31
⋅
SentinelOne
⋅
The BLINDINGCAN RAT and Malicious North Korean Activity BLINDINGCAN |
2020-08-31
⋅
Netlab
⋅
In the wild QNAP NAS attacks |
2020-08-31
⋅
The DFIR Report
⋅
NetWalker Ransomware in 1 Hour Cobalt Strike Mailto MimiKatz |
2020-08-31
⋅
cyber.wtf blog
⋅
Trickbot rdpscanDll – Transforming Candidate Credentials for Brute-Forcing RDP Servers TrickBot |
2020-08-31
⋅
⋅
JPCERT/CC
⋅
Malware used by the attack group Lazarus after network intrusion |
2020-08-30
⋅
⋅
Z3 Ransomware Z3 |
2020-08-29
⋅
Aguinet
⋅
Emulating NotPetya bootloader with Miasm EternalPetya |
2020-08-28
⋅
CYBERWISE
⋅
Cerberus Banking Trojan Analysis Cerberus |
2020-08-28
⋅
NTT
⋅
Operation Lagtime IT: Colourful Panda Footprint Cotx RAT Poison Ivy TA428 |
2020-08-28
⋅
McAfee
⋅
MVISION Insights: Wastedlocker Ransomware WastedLocker |
2020-08-28
⋅
360 Core Security
⋅
The "sneak camera" in mobile pornography software |
2020-08-28
⋅
Checkpoint
⋅
Gozi: The Malware with a Thousand Faces DreamBot ISFB LOLSnif SaiGon |
2020-08-28
⋅
White Ops
⋅
TERRACOTTA Android Malware: A Technical Study |