Click here to download all references as Bib-File.•
2020-02-02
⋅
ESET Research
⋅
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs Kobalos |
2020-01-28
⋅
CitizenLab
⋅
Stopping the Press: New York Times Journalist Targeted by Saudi-linked Pegasus Spyware Operator Chrysaor |
2020-01-15
⋅
Marco Ramilli's Blog
⋅
Iranian Threat Actors: Preliminary Analysis POWERSTATS |
2019-12-05
⋅
Marco Ramilli's Blog
⋅
APT28 Attacks Evolution APT28 |
2019-11-05
⋅
McAfee
⋅
Buran Ransomware; the Evolution of VegaLocker VegaLocker |
2019-11-04
⋅
Marco Ramilli's Blog
⋅
Is Lazarus/APT38 Targeting Critical Infrastructures? Dtrack |
2019-10-31
⋅
m.alvar.es
⋅
Dynamic Imports and Working Around Indirect Calls - Smokeloader Study Case SmokeLoader |
2019-10-28
⋅
Marco Ramilli's Blog
⋅
SWEED Targeting Precision Engineering Companies in Italy Loki Password Stealer (PWS) |
2019-10-14
⋅
Is Emotet gang targeting companies with external SOC? Emotet |
2019-10-07
⋅
ESET Research
⋅
CONNECTING THE DOTS: Exposing the arsenal and methods of the Winnti Group LOWKEY shadowhammer ShadowPad |
2019-10-02
⋅
Certego
⋅
Malware Tales: FTCODE FTCODE |
2019-09-24
⋅
The Citizen Lab
⋅
Missing Link Tibetan Groups Targeted with 1-Click Mobile Exploits PoisonCarp POISON CARP |
2019-09-09
⋅
McAfee
⋅
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study Cutwail Dridex Dyre Kovter Locky Phorpiex Simda |
2019-08-05
⋅
security.neurolabs
⋅
Smokeloader's Hardcoded Domains - Sneaky Third Party Vendor or Cheap Buyer? SmokeLoader |
2019-08-01
⋅
McAfee
⋅
Clop Ransomware Clop |
2019-07-13
⋅
Free Tool: LooCipher Decryptor |
2019-06-06
⋅
APT34: Jason project jason |
2019-05-02
⋅
Marco Ramilli's Blog
⋅
APT34: Glimpse project BONDUPDATER |
2019-04-23
⋅
APT34: webmask project DNSpionage |
2019-04-10
⋅
Github (ICSrepo)
⋅
TRISIS / TRITON / HatMan Malware Repository Triton |