Click here to download all references as Bib-File.•
| 2020-08-12
            
            ⋅
            
            
            ⋅ Antiy's analysis report on the recent APT attacks against the Green Spot organization | 
| 2020-08-12
            
            ⋅
            
            Kaspersky Labs
            ⋅ Internet Explorer and Windows zero-day exploits used in Operation PowerFall | 
| 2020-08-11
            
            ⋅
            
            FireEye
            ⋅ COOKIEJAR: Tracking Adversaries With FireEye Endpoint Security’s Logon Tracker Module | 
| 2020-08-11
            
            ⋅
            
            Dylan Codes Blog
            ⋅ Defending Your Malware | 
| 2020-08-10
            
            ⋅
            
            ID Ransomware
            ⋅ DarkSide Ransomware DarkSide | 
| 2020-08-10
            
            ⋅
            
            ZDNet
            ⋅ FBI says an Iranian hacking group is attacking F5 networking devices SSHNET Fox Kitten | 
| 2020-08-10
            
            ⋅
            
            Anomali
            ⋅ Anomali Threat Research Releases First Public Analysis of Smaug Ransomware as a Service SMAUG | 
| 2020-08-10
            
            ⋅
            
            tccontre Blog
            ⋅ Learning From ICEID loader - Including its Steganography Payload Parsing IcedID | 
| 2020-08-10
            
            ⋅
            
            Seqrite
            ⋅ Gorgon APT targeting MSME sector in India Agent Tesla | 
| 2020-08-10
            
            ⋅
            
            SentinelOne
            ⋅ Agent Tesla | Old RAT Uses New Tricks to Stay on Top Agent Tesla | 
| 2020-08-10
            
            ⋅
            
            FR3D.HK
            ⋅ DiamondFox - Bank Robbers will be replaced DiamondFox | 
| 2020-08-10
            
            ⋅
            
            ZDNet
            ⋅ FBI says an Iranian hacking group is attacking F5 networking devices MimiKatz | 
| 2020-08-10
            
            ⋅
            
            Malwarebytes
            ⋅ SBA phishing scams: from malware to advanced social engineering CloudEyE | 
| 2020-08-09
            
            ⋅
            
            F5 Labs
            ⋅ Banking Trojans: A Reference Guide to the Malware Family Tree BackSwap Carberp Citadel DanaBot Dridex Dyre Emotet Gozi Kronos PandaBanker Ramnit Shylock SpyEye Tinba TrickBot Vawtrak Zeus | 
| 2020-08-08
            
            ⋅
            
            Speakerdeck (Viralmaniar)
            ⋅ Phirautee - DEFCON28 - Writing Ransomware using Living off the Land (LotL) Tactics | 
| 2020-08-07
            
            ⋅
            
            ESET Research
            ⋅ Stadeo: Deobfuscating Stantinko and more Stantinko | 
| 2020-08-07
            
            ⋅
            
            QuoScient
            ⋅ BlackWater Malware Leveraging Beirut Tragedy in New Targeted Campaign | 
| 2020-08-07
            
            ⋅
            
            
            ⋅
            
            CSIRT Italia
            ⋅ New Phishing-As-A-Service framework | 
| 2020-08-06
            
            ⋅
            
            Theta
            ⋅ Part 3: analysing MedusaLocker ransomware MedusaLocker | 
| 2020-08-06
            
            ⋅
            
            KELA
            ⋅ The Secret Life of an Initial Access Broker |