Click here to download all references as Bib-File.•
| 2020-09-10
            
            ⋅
            
            ESET Research
            ⋅ Who is calling? CDRThief targets Linux VoIP softswitches CDRThief | 
| 2020-09-10
            
            ⋅
            
            SANS ISC InfoSec Forums
            ⋅ Recent Dridex activity Dridex | 
| 2020-09-10
            
            ⋅
            
            Medium mariohenkel
            ⋅ Decrypting NanoCore config and dump all plugins Nanocore RAT | 
| 2020-09-10
            
            ⋅
            
            Microsoft
            ⋅ New cyberattacks targeting U.S. elections | 
| 2020-09-09
            
            ⋅
            
            Malwarebytes
            ⋅ Malvertising campaigns come back in full swing Raccoon SmokeLoader Malsmoke | 
| 2020-09-09
            
            ⋅
            
            Malwarebytes
            ⋅ Malvertising campaigns come back in full swing Raccoon SmokeLoader | 
| 2020-09-08
            
            ⋅
            
            MALWATION
            ⋅ Malware Config Extraction Diaries #1 – GuLoader CloudEyE | 
| 2020-09-08
            
            ⋅
            
            PTSecurity
            ⋅ ShadowPad: new activity from the Winnti group CCleaner Backdoor Korlia ShadowPad TypeHash | 
| 2020-09-08
            
            ⋅
            
            Trend Micro
            ⋅ Exposed Docker Server Abused to Drop Cryptominer, DDoS Bot Kaiten | 
| 2020-09-08
            
            ⋅
            
            
            ⋅
            
            NSFOCUS
            ⋅ APT GROUP系列——DARKHOTEL之窃密与RAT篇 Nemim | 
| 2020-09-08
            
            ⋅
            
            Zscaler
            ⋅ TikTok Spyware: A detailed analysis of spyware masquerading as TikTok | 
| 2020-09-08
            
            ⋅
            
            Team Cymru
            ⋅ GhostDNSbusters: Illuminating GhostDNS Infrastructure | 
| 2020-09-08
            
            ⋅
            
            Intezer
            ⋅ Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks | 
| 2020-09-08
            
            ⋅
            
            Microsoft
            ⋅ TeamTNT activity targets Weave Scope deployments | 
| 2020-09-08
            
            ⋅
            
            Lopqto's Adventures
            ⋅ Automated dynamic import resolving using binary emulation Mailto | 
| 2020-09-07
            
            ⋅
            
            Github (StrangerealIntel)
            ⋅ Time to take the bull by the horns RedLine Stealer Taurus Stealer | 
| 2020-09-07
            
            ⋅
            
            Github (pan-unit42)
            ⋅ Collection of recent Dridex IOCs Cutwail Dridex | 
| 2020-09-07
            
            ⋅
            
            CERT-FR
            ⋅ Bulletin d'alerte du CERT-FR: Recrudescence d’activité Emotet en France Emotet | 
| 2020-09-07
            
            ⋅
            
            CERT NZ
            ⋅ Emotet Malware being spread via email Emotet | 
| 2020-09-06
            
            ⋅
            
            Twitter (@3xp0rtblog)
            ⋅ Tweet and description of NixScare Stealer NixScare Stealer |