Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-06GdataKarsten Hahn
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
CryptBot
2020-02-06Bleeping ComputerLawrence Abrams
Ransomware Exploits GIGABYTE Driver to Kill AV Processes
RobinHood
2020-02-06SophosAndrew Brandt, Mark Loman
Living off another land: Ransomware borrows vulnerable driver to remove security software
RobinHood
2020-02-06IronNetJonathan Lepore
DNS Tunneling Series, Part 3: The Siren Song of RogueRobin
RogueRobin
2020-02-05Bleeping ComputerLawrence Abrams
Mailto (NetWalker) Ransomware Targets Enterprise Networks
Mailto
2020-02-05FireEyeAndrew Moore, Blaine Stancill, Genevieve Stark, Rick Cole
STOMP 2 DIS: Brilliance in the (Visual) Basics
MINEBRIDGE
2020-02-05SentinelOneVitali Kremez
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting
Pteranodon
2020-02-05CybereasonAssaf Dahan, Lior Rochberger
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Amadey Azorult Predator The Thief STOP Vidar
2020-02-04Security-in-BitsSecurity-in-Bits
Similarity between Qealler/Pyrogenic variants -Part 0x3
Qealler
2020-02-04ID RansomwareAndrew Ivanov
RagnarLocker Ransomware
RagnarLocker
2020-02-04Github (onek1lo)one_k1lo
Borr-Stealer: Repository with decompiled code
Borr
2020-02-04one_k1lo
Borr Malware
Borr
2020-02-040x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-02-04RevCode
RevCode RAT
WebMonitor RAT
2020-02-03SANS ISCJan Kopriva
Analysis of a triple-encrypted AZORult downloader
Azorult
2020-02-03ID RansomwareAndrew Ivanov
PassLock Ransomware
Passlock
2020-02-03TelekomThomas Barabosch
Dissecting Emotet – Part 1
Emotet
2020-02-03DragosDragos
EKANS Ransomware and ICS Operations
Snake
2020-02-03Check Point ResearchYaroslav Harakhavik
Warzone: Behind the enemy lines
Ave Maria
2020-02-02ESET ResearchIgnacio Sanmillan, Marc-Etienne M.Léveillé
TLP: WHITE A WILD KOBALOS APPEARSTricksy Linux malware goes after HPCs
Kobalos