Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-21Malwarebyteshasherezade, prsecurity
The “Silent Night” Zloader/Zbot
Zloader
2020-05-20ZscalerAmandeep Kumar, Rohit Chaturvedi
Latest Version of Amadey Introduces Screen Capturing and Pushes the Remcos RAT
Amadey Remcos
2020-05-20Medium Asuna AmawakaAsuna Amawaka
What happened between the BigBadWolf and the Tiger?
Ghost RAT
2020-05-20VIPREVIPRE Labs
Unloading the GuLoader
CloudEyE
2020-05-20SentinelOneJim Walter
Why On-Device Detection Matters: New Ramsay Trojan Targets Air-Gapped Networks
Ramsay
2020-05-20PTSecurityPT ESC Threat Intelligence
Operation TA505: how we analyzed new tools from the creators of the Dridex trojan, Locky ransomware, and Neutrino botnet
FlawedAmmyy
2020-05-20Youtube (nonepizza)nonepizza
(PandaBanker Analysis) Fixing Corrupted PE Headers and Unmapping an Executable
PandaBanker
2020-05-20Avast DecodedAlexej Savčin, David Jursa, Jan Rubín, Simi Musilova
GhostDNS Source Code Leaked
2020-05-20ReflectizReflectiz
The Gocgle Malicious Campaign
magecart
2020-05-20ProofpointDennis Schwarz, Matthew Mesa, Proofpoint Threat Research Team
ZLoader Loads Again: New ZLoader Variant Returns
Zloader
2020-05-19zero2autoVitali Kremez
Netwalker Ransomware - From Static Reverse Engineering to Automatic Extraction
Mailto
2020-05-19HornetsecuritySecurity Lab
Information Stealer Campaign Targeting German HR Contacts
LALALA Stealer
2020-05-19Advanced IntelligenceAdvanced Intelligence, Bridgit Sullivan, Daniel Frey
NetWalker Ransomware Group Enters Advanced Targeting “Game”
Mailto
2020-05-19SymantecCritical Attack Discovery and Intelligence Team
Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia
ISMAgent ISMDoor
2020-05-19Cisco TalosPaul Rascagnères, Vitor Ventura, Warren Mercer
The wolf is back...
WolfRAT
2020-05-19AlienLabsOfer Caspi
TrickBot BazarLoader In-Depth
Anchor BazarBackdoor TrickBot
2020-05-18ThreatpostTara Seals
Ransomware Gang Arrested for Spreading Locky to Hospitals
Locky
2020-05-18Trend MicroKaren Victor
Netwalker Fileless Ransomware Injected via Reflective Loading
Mailto
2020-05-18Palo Alto Networks Unit 42Asher Davila, Yang Ji
Eleethub: A Cryptocurrency Mining Botnet with Rootkit for Self-Hiding
PerlBot
2020-05-18Github (dlegezo)Denis Legezo
Microcin Decryptor
Microcin