Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-16CISAUS-CERT
Malware Analysis Report (AR20-198B)
WellMess
2020-07-16PWC UKPWC UK
How WellMess malware has been used to target Covid-19 vaccines
elf.wellmess WellMess
2020-07-16F-SecureAdam Pilkey
US, UK, and Canada’s COVID-19 research targeted by APT29
2020-07-16WiredAndy Greenberg
Iranian Spies Accidentally Leaked Videos of Themselves Hacking
2020-07-16SecurityIntelligenceAllison Wikoff, Richard Emerson
New Research Exposes Iranian Threat Group (APT35/ITG18) Operations
2020-07-16ESET ResearchMarc-Etienne M.Léveillé
Mac cryptocurrency trading application rebranded, bundled with malware
Gmera
2020-07-16ESET ResearchAmer Owaida
High‑profile Twitter accounts hacked to promote Bitcoin scam
2020-07-16CybereasonAssaf Dahan, Daniel Frank, Mary Zhao
A Bazar of Tricks: Following Team9’s Development Cycles
BazarBackdoor
2020-07-15MandiantCorey Hildebrandt, Daniel Kapellmann Zafra, Keith Lunden, Ken Proska, Nathan Brubaker
Financially Motivated Actors Are Expanding Access Into OT: Analysis of Kill Lists That Include OT Processes Used With Seven Malware Families
Clop DoppelPaymer LockerGoga Maze MegaCortex Nefilim Snake
2020-07-15RelativityBartlomiej Czyż
An in-depth analysis of SpyNote remote access trojan
SpyNote
2020-07-15ZDNetCatalin Cimpanu
Chinese state hackers target Hong Kong Catholic Church
PlugX
2020-07-15Yahoo NewsJenna McLaughlin, Kim Zetter, Sean D. Naylor, Zach Dorfman
Exclusive: Secret Trump order gives CIA more powers to launch cyberattacks
2020-07-15N1ght-W0lf BlogAbdallah Elshinbary
Deep Analysis of QBot Banking Trojan
QakBot
2020-07-15Advanced IntelligenceSamantha van de Ven, Yelisey Boguslavskiy
Inside REvil Extortionist “Machine”: Predictive Insights
Gandcrab REvil
2020-07-15Intel 471Intel 471
Flowspec – TA505’s bulletproof hoster of choice
Get2
2020-07-15Johannes Bader's BlogJohannes Bader
The Defective Domain Generation Algorithm of BazarBackdoor
BazarBackdoor
2020-07-14International Journal of Intelligence and Counter IntelligenceChristian Doerr, Kris Oosthoek
Cyber Threat Intelligence: A Product Without aProcess?
2020-07-14Cyborg SecurityAustin Jackson
PYTHON MALWARE ON THE RISE
Poet RAT PyLocky SEADADDY
2020-07-14CrowdStrikeFalcon OverWatch Team
Manufacturing Industry in the Adversaries’ Crosshairs
ShadowPad Snake
2020-07-14blog.rootshell.beXavier Mertens
Simple DGA Spotted in a Malicious PowerShell