Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-07-05Council on Foreign RelationsCyber Operations Tracker
Winnti Umbrella
APT41
2020-07-05Council on Foreign RelationsCyber Operations Tracker
Red October
Inception Framework
2020-07-05or10nlabsoR10n
Reverse Engineering the Mustang Panda PlugX RAT – Extracting the Config
PlugX
2020-07-05NCC GroupNCC RIFT
RIFT: F5 Networks K52145254: TMUI RCE vulnerability CVE-2020-5902 Intelligence
2020-07-04N1ght-W0lf BlogAbdallah Elshinbary
Deep Analysis of Anubis Banking Malware
Anubis
2020-07-03F-Secure LabsAnartz Martin
Attack Detection Fundamentals: Code Execution and Persistence - Lab #1
Astaroth
2020-07-02ZscalerMohd Sadique
CyberGate RAT and RedLine Stealer Delivered in Ongoing AutoIt Malware Campaigns
CyberGate RedLine Stealer
2020-07-02TrustwaveBrian Hussey
GoldenSpy Chapter 3: New and Improved Uninstaller
GoldenSpy
2020-07-02AhnLabAhnLab ASEC Analysis Team
Malicious Hangul Word Processor Files Exploiting Ghostscript Vulnerability
2020-07-01ContextisLampros Noutsos, Oliver Fay
DLL Search Order Hijacking
Cobalt Strike PlugX
2020-07-01360360 Threat Intelligence Center
游走在东欧和中亚的奇幻熊
Zebrocy
2020-07-01Cisco TalosEdmund Brumaghin, Mariano Graziano, Nick Biasini
Threat Spotlight: Valak Slithers Its Way Into Manufacturing and Transportation Networks
Valak IcedID ISFB MyKings Spreader
2020-07-01FlashpointFlashpoint
Zeppelin Ransomware Analysis
2020-07-01ITOCHU Corporation, Macnica
Business Email Scams and Countermeasures, Clever tricks of cyber crimes that cause huge damage
2020-07-01TG SoftTG Soft
Cyber-Threat Report on the cyber attacks of June 2020 in Italy
Avaddon ISFB
2020-07-01AreteArete Incident Response
WastedLocker Ransomware Insights
WastedLocker
2020-07-01ThreatFabricThreatFabric
BlackRock - the Trojan that wanted to get them all
2020-07-01FortinetBen Hunter, Fred Gutierrez
EKANS Ransomware Targeting OT ICS Systems
Snake
2020-07-01CenturylinkBlack Lotus Labs
Alina Point of Sale Malware Still Lurking in DNS
Alina POS
2020-07-01VMRayJohn Faria
Threat Bulletin: Cutting-off the Command-and-Control Infrastructure of CollectorGoomba
CollectorGoomba