Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-02-07Medium SebdravenSébastien Larinier
APT 40 in Malaysia
DADJOKE
2020-02-07RiskIQJordan Herman
Magecart Group 12’s Latest: Actors Behind Attacks on Olympics Ticket Re-sellers Deftly Swapped Domains to Continue Campaign
magecart
2020-02-07Binary DefenseJames Quinn
Emotet Evolves With New Wi-Fi Spreader
Emotet
2020-02-06DomainToolsChad Anderson
Finding Additional Indicators With a SeaTurtle Deep Dive in Passive DNS Within DomainTools Iris
Sea Turtle
2020-02-06PrevailionDanny Adamitis
The Triune Threat: MasterMana Returns
Azorult Loki Password Stealer (PWS)
2020-02-06GdataKarsten Hahn
40,000 CryptBot Downloads per Day: Bitbucket Abused as Malware Slinger
CryptBot
2020-02-06Bleeping ComputerLawrence Abrams
Ransomware Exploits GIGABYTE Driver to Kill AV Processes
RobinHood
2020-02-06SophosAndrew Brandt, Mark Loman
Living off another land: Ransomware borrows vulnerable driver to remove security software
RobinHood
2020-02-06IronNetJonathan Lepore
DNS Tunneling Series, Part 3: The Siren Song of RogueRobin
RogueRobin
2020-02-05Bleeping ComputerLawrence Abrams
Mailto (NetWalker) Ransomware Targets Enterprise Networks
Mailto
2020-02-05FireEyeAndrew Moore, Blaine Stancill, Genevieve Stark, Rick Cole
STOMP 2 DIS: Brilliance in the (Visual) Basics
MINEBRIDGE
2020-02-05SentinelOneVitali Kremez
Pro-Russian CyberSpy Gamaredon Intensifies Ukrainian Security Targeting
Pteranodon
2020-02-05CybereasonAssaf Dahan, Lior Rochberger
The Hole in the Bucket: Attackers Abuse Bitbucket to Deliver an Arsenal of Malware
Amadey Azorult Predator The Thief STOP Vidar
2020-02-04Security-in-BitsSecurity-in-Bits
Similarity between Qealler/Pyrogenic variants -Part 0x3
Qealler
2020-02-04Github (onek1lo)one_k1lo
Borr-Stealer: Repository with decompiled code
Borr
2020-02-040x00secDan Lisichkin
Analyzing Modern Malware Techniques - Part 3: A case of Powershell, Excel 4 Macros and VB6
2020-02-04RevCode
RevCode RAT
WebMonitor RAT
2020-02-03SANS ISCJan Kopriva
Analysis of a triple-encrypted AZORult downloader
Azorult
2020-02-03TelekomThomas Barabosch
Dissecting Emotet – Part 1
Emotet
2020-02-03DragosDragos
EKANS Ransomware and ICS Operations
Snake