Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-04-30Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Behind the Scenes with OilRig
BONDUPDATER
2019-04-30ForcepointRobert Neumann
TinyPOS: An analysis of a Point-Of-Sale malware ecosystem
2019-04-30Cisco TalosColin Grady, Jaeson Schultz, Matt Valites, Pierre Cadieux
Sodinokibi ransomware exploits WebLogic Server vulnerability
REvil
2019-04-30ESET ResearchESET Research
Buhtrap backdoor and Buran ransomware distributed via major advertising platform
Buhtrap ClipBanker RTM
2019-04-30Twitter (@siri_urz)
Nightmare Spam Bot Strings Snapshot
2019-04-30ClearSkyClearSky Cyber Security
Raw Threat Intelligence 2019-04-30: Oilrig data dump link analysis
SpyNote OopsIE
2019-04-29BluelivBlueliv Labs Team
Where is Emotet? Latest geolocation data
Emotet
2019-04-27nao_secnao_sec
Analyzing Amadey
Amadey
2019-04-26Bleeping ComputerLawrence Abrams
A Closer Look at the RobbinHood Ransomware
RobinHood
2019-04-26MalwarebytesJérôme Segura
GitHub hosted Magecart skimmer used against hundreds of e-commerce sites
magecart
2019-04-25DATANETKim Seon-ae
Chinese-based hackers attack domestic energy institutions
CALMTHORN Ghost RAT
2019-04-25CiscoAndrew Williams, Edmund Brumaghin, Nick Biasini
JasperLoader Emerges, Targets Italy with Gootkit Banking Trojan
JasperLoader
2019-04-25CybereasonCybereason Nocturnus
Threat Actor TA505 Targets Financial Enterprises Using LOLBins and a New Backdoor Malware
ServHelper TA505
2019-04-25AppGateEdgar Felipe Duarte Porras
Meet Lucifer: A New International Trojan
Astaroth
2019-04-25Twitter (@VK_intel)Vitali Kremez
Tweet on Ransomware
RobinHood
2019-04-25FireEyeJames T. Bennett, Michael Bailey
CARBANAK Week Part Four: The CARBANAK Desktop Video Player
2019-04-25Trend MicroTrendmicro
Emotet Adds New Evasion Technique
Emotet
2019-04-24Check Point ResearchItay Cohen
Deobfuscating APT32 Flow Graphs with Cutter and Radare2
Salgorea
2019-04-24WeixinTencent
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed
Cobalt Strike SOUNDBITE
2019-04-24SymantecSymantec Response Attack Investigation Team
Beapy: Cryptojacking Worm Hits Enterprises in China
Beapy