Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-10laceworkChris Hall
Meet Muhstik – IoT Botnet Infecting Cloud Servers
Tsunami
2020-11-05McAfeeChristiaan Beek, Ryan Sherstobitoff
Operation North Star: Behind The Scenes
NedDnLoader Torisma
2020-11-01AppRiverChris Lee
Vjw0rm Is Back With New Tactics
Vjw0rm
2020-10-30ReutersChristopher Bing, Joel Schectman, Raphael Satter
Russian hackers targeted California, Indiana Democratic parties
2020-10-29ReutersChristopher Bing, Joseph Menn
Building wave of ransomware attacks strike U.S. hospitals
Ryuk
2020-10-23ReutersChristopher Bing
Exclusive: National Guard called in to thwart cyberattack in Louisiana weeks before election
KimJongRat
2020-10-23ReutersChristopher Bing, Jack Stubbs
Exclusive: 'Dumb mistake' exposed Iranian hand behind fake Proud Boys U.S. election emails - sources
2020-10-15laceworkChris Hall
Moobot's Cloud Migration
2020-10-07Github (brompwnie)Chris Le Roy
Break out the Box (BOtB)
Break out the Box
2020-09-29Cisco TalosChris Neal
LodaRAT Update: Alive and Well
Loda
2020-08-31IndeChris Campbell
Analysis of the latest wave of Emotet malicious documents
Emotet
2020-08-17Cado SecurityChris Doman
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT TeamTNT
2020-08-17Cado SecurityChris Doman, James Campbell
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT
2020-07-14International Journal of Intelligence and Counter IntelligenceChristian Doerr, Kris Oosthoek
Cyber Threat Intelligence: A Product Without aProcess?
2020-07-10ReversingLabsChristiaan Beek, Cooper Quintin, Hilko Bengen, Jo Johnson, Tom Ueltschi, Tomislav Pericin, Vitali Kremez, Wyatt Roersma
YARA Rules talks and presentation of REVERSING 2020
2020-07-01LookoutApurva Kumar, Christoph Hebeisen, Kristin Del Rosso
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs
2020-06-30CrowdStrikeChad Hemenway, Chris Cwalina, Josh Burgess, Scot Lippenholz
Playing Chess Against Nation-State and Ransomware Threat Actors
2020-06-24Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Ken Hsu, Zhibin Zhang
Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices
Lucifer
2020-06-16GraphikaBen Nimmo, C. Shawn Eib, Camille François, Chris Hernon, Lea Ronzaud, Rodrigo Ferreira, Tim Kostelancik
Secondary Infektion
2020-06-11Cado SecurityChris Doman, James Campbell
An Ongoing AWS Phishing Campaign