Click here to download all references as Bib-File.•
2019-08-15
⋅
Malwarebytes
⋅
The Hidden Bee infection chain, part 1: the stegano pack Hidden Bee |
2019-08-15
⋅
Github (jeFF0Falltrades)
⋅
MICROPSIA (APT-C-23) Micropsia |
2019-08-14
⋅
ESET Research
⋅
In the Balkans, businesses are under fire from a double‑barreled weapon BalkanDoor BalkanRAT |
2019-08-13
⋅
Cyberbit
⋅
HawkEye Malware Changes Keylogging Technique HawkEye Keylogger |
2019-08-13
⋅
Adalogics
⋅
The state of advanced code injections Dridex Emotet Tinba |
2019-08-13
⋅
⋅
洞察人性:一起利用政治人物桃色丑闻的诱饵攻击活动披露 DADJOKE |
2019-08-12
⋅
Gdata
⋅
Malware Naming Hell Part 1: Taming the mess of AV detection names Snifula |
2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower Inception Framework |
2019-08-12
⋅
Kindred Security
⋅
An Overview of Public Platform C2’s HTML5 Encoding LOWBALL Makadocs MiniDuke RogueRobinNET RokRAT |
2019-08-12
⋅
Twitter (@albertzsigovits)
⋅
Tweet on Oski Stealer Oski Stealer |
2019-08-12
⋅
Kaspersky SAS
⋅
Chamois: Android's Most Impactful Botnet of 2018 Chamois |
2019-08-12
⋅
⋅
Schweizerische Eidgenossenschaft
⋅
Trojaner Emotet greift Unternehmensnetzwerke an Emotet |
2019-08-12
⋅
Proofpoint
⋅
PsiXBot Continues to Evolve with Updated DNS Infrastructure PsiX |
2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower |
2019-08-11
⋅
Twitter (@KevinPerlow)
⋅
Updated #Lazarus Keylogger (uploaded June) PSLogger |
2019-08-10
⋅
Dissecting Malware
⋅
GermanWiper's big Brother? GandGrab's kid ? Sodinokibi! REvil |
2019-08-10
⋅
Check Point
⋅
SELECT code_execution FROM * USING SQLite; Azorult Loki Password Stealer (PWS) Pony |
2019-08-09
⋅
FireEye
⋅
Double Dragon APT41, a dual espionage and cyber crime operation CLASSFON crackshot CROSSWALK GEARSHIFT HIGHNOON HIGHNOON.BIN JUMPALL poisonplug Winnti |
2019-08-08
⋅
MITRE
⋅
Russian Military Thought: Concepts and Elements |
2019-08-08
⋅
BlackHat
⋅
The Enemy Within: Modern Supply Chain Attacks VPNFilter |