Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-31The RecordCatalin Cimpanu
Russian hacker Pavel Sitnikov arrested for sharing malware source code
Anubis
2020-05-31Twitter (ShadowChasing1)Shadow Chaser Group
Tweet on DTRACK malware
Dtrack
2020-05-31InfoSec Handlers Diary BlogRenato Marinho
Guildma is now using Finger and Signed Binary Proxy Execution to evade defenses
Astaroth
2020-05-31KasperskyDavid Emm
IT threat evolution Q1 2021
2020-05-31Nullteilerfrei BlogLars Wallenborn
String Obfuscation in the Hamweq IRC-bot
Hamweq
2020-05-30KELASharon Bitton, Victoria Kivilevich
Exposing the UAE’s Underground Digital Dangers: The Attack Surface of One of the Most Digitally Advanced Countries in the Arab World
2020-05-30Youtube (OALabs)Sergei Frankoff
IRC Botnet Reverse Engineering Part 1 - Preparing Binary for Analysis in IDA PRO
Hamweq
2020-05-29The New York TimesAndrew E. Kramer, Anton Troianovski, Michael Schwirtz
Secret Chats Show How Cybergang Became a Ransomware Powerhouse
DarkSide
2020-05-29ZscalerSudeep Singh
ShellReset RAT Spread Through Macro-Based Documents Using AppLocker Bypass
Quasar RAT
2020-05-29Group-IBIvan Pisarev
IcedID: When ice burns through bank accounts
IcedID
2020-05-29CofenseElmer Hernandez
Phishers Cast a Wider Net in the African Banking Sector
2020-05-28VMWare Carbon BlackRyan Murphy, Tom Kellermann
Modern Bank Heists 3.0
Emotet
2020-05-28CrowdStrikeThe Crowdstrike Intel Team
DarkSide Pipeline Attack Shakes Up the Ransomware-as-a-Service Landscape
DarkSide DarkSide
2020-05-28The RecordAdam Janofsky
Self-described “king of fraud” is convicted for role in Methbot scam
2020-05-28QianxinThreat Intelligence Center
Analysis of recent rattlesnake APT attacks against surrounding countries and regions
SideWinder
2020-05-28Twitter (@stvemillertime)Steve Miller
Tweet on TClient / FIRESHADOW used by Tropic Trooper
TClient
2020-05-28Bleeping ComputerAx Sharma
Microsoft IIS servers hacked by Blue Mockingbird to mine Monero
2020-05-28CybereasonAssaf Dahan, Eli Salem, Lior Rochberger
Valak: More than Meets the Eye
Valak
2020-05-28EpicTurlaJuan Andrés Guerrero-Saade
SysInTURLA
Kazuar
2020-05-28National Security AgencyCybersecurity Advisory
Sandworm Actors Exploiting Vulnerability in EXIM Mail Transfer Agent