Click here to download all references as Bib-File.•
2020-06-02
⋅
MalwareNailed
⋅
PebbleDash - Lazarus / HiddenCobra RAT PEBBLEDASH |
2020-06-02
⋅
Fox-IT
⋅
In-depth analysis of the new Team9 malware family BazarBackdoor |
2020-06-02
⋅
Lastline Labs
⋅
Evolution of Excel 4.0 Macro Weaponization Agent Tesla DanaBot ISFB TrickBot Zloader |
2020-06-02
⋅
Pwntario Blog
⋅
Hunting Malicious Macros |
2020-06-02
⋅
NCC Group
⋅
In-depth analysis of the new Team9 malware family BazarBackdoor |
2020-06-01
⋅
Twitter (@voodoodahl1)
⋅
Tweet on malware called knspy used by Donot KnSpy |
2020-06-01
⋅
Sophos Labs
⋅
THE INCREASINGLY COMPLEX KINGMINER BOTNET Kingminer |
2020-06-01
⋅
Arete
⋅
Sodinokibi / REvil Ransomware attacks against the Education Sector REvil |
2020-06-01
⋅
USB Security-Myths vs. Reality |
2020-06-01
⋅
Lookout
⋅
Mobile APT SurveillanceCampaigns Targeting Uyghurs A collection of long-running Android tooling connected to a Chinese mAPT actor CarbonSteal DoubleAgent GoldenEagle SilkBean |
2020-06-01
⋅
Twitter (@ItsReallyNick)
⋅
Tweet on malware called NETFLASH |
2020-06-01
⋅
Seguranca Informatica
⋅
In-depth analysis of a trojan banker impacting Portugal and Brazil |
2020-05-31
⋅
Malwarebytes
⋅
Revisiting the NSIS-based crypter Formbook |
2020-05-31
⋅
Medium walmartglobaltech
⋅
WastedLoader or DridexLoader? Dridex WastedLocker |
2020-05-31
⋅
⋅
ESET Research
⋅
Ransomware Avaddon: principales características Avaddon |
2020-05-31
⋅
The Record
⋅
Russian hacker Pavel Sitnikov arrested for sharing malware source code Anubis |
2020-05-31
⋅
Twitter (ShadowChasing1)
⋅
Tweet on DTRACK malware Dtrack |
2020-05-31
⋅
InfoSec Handlers Diary Blog
⋅
Guildma is now using Finger and Signed Binary Proxy Execution to evade defenses Astaroth |
2020-05-31
⋅
Kaspersky
⋅
IT threat evolution Q1 2021 |
2020-05-31
⋅
Nullteilerfrei Blog
⋅
String Obfuscation in the Hamweq IRC-bot Hamweq |