Click here to download all references as Bib-File.•
2020-07-10
⋅
ReversingLabs
⋅
YARA Rules talks and presentation of REVERSING 2020 |
2020-07-09
⋅
VMRay
⋅
Threat Bulletin: Dissecting GuLoader’s Evasion Techniques CloudEyE |
2020-07-09
⋅
Github (krautface)
⋅
Gist with observed grelos skimmer grelos |
2020-07-09
⋅
Gdata
⋅
ServHelper: Hidden Miners ServHelper |
2020-07-09
⋅
360 netlab
⋅
An Update for a Very Active DDos Botnet: Moobot MooBot |
2020-07-09
⋅
Checkpoint
⋅
New Joker variant hits Google Play with an old trick Joker |
2020-07-09
⋅
ESET Research
⋅
More evil: A deep look at Evilnum and its toolset EVILNUM More_eggs EVILNUM TerraPreter TerraStealer TerraTV Evilnum |
2020-07-08
⋅
ThaiCERT
⋅
Threat Group Cards: A Threat Actor Encyclopedia TA516 TA547 TA554 TA555 |
2020-07-08
⋅
SentinelOne
⋅
“EvilQuest” Rolls Ransomware, Spyware & Data Theft Into One EvilQuest |
2020-07-08
⋅
Bitdefender
⋅
Kingminer –a Crypto-Jacking Botnet Under the Scope Kingminer |
2020-07-08
⋅
Trend Micro
⋅
Ransomware Report: Avaddon and New Techniques Emerge, Industrial Sector Targeted Avaddon |
2020-07-08
⋅
Trend Micro
⋅
New Mirai Variant Expands Arsenal, Exploits CVE-2020-10173 Mirai |
2020-07-08
⋅
Seqrite
⋅
Operation ‘Honey Trap’: APT36 Targets Defense Organizations in India Crimson RAT |
2020-07-08
⋅
COLUMBIA | SIPA
⋅
Named But Hardly Shamed: What is the Impact of Information Disclosures on an APT Operations? |
2020-07-08
⋅
xunison
⋅
Analysis of SamoRAT SamoRAT |
2020-07-08
⋅
Medium (@sevdraven)
⋅
How to unpack Chinoxy backdoor and decipher the configuration of the backdoor Chinoxy |
2020-07-08
⋅
Intel 471
⋅
Iran’s domestic espionage: Lessons from recent data leaks |
2020-07-08
⋅
Restricting SMB-based lateral movement in a Windows environment |
2020-07-08
⋅
VMWare Carbon Black
⋅
TAU Threat Discovery: Conti Ransomware Conti |
2020-07-07
⋅
Department of Justice
⋅
United States District Court for the Eastern District of Washington vs. Li Xiaoyu (oro0lxy) and Dong Jiazhi BRONZE SPRING |