Click here to download all references as Bib-File.•
2019-08-01
⋅
ThreatFabric
⋅
Cerberus - A new banking Trojan from the underworld Cerberus |
2019-08-01
⋅
Bromium
⋅
Decrypting L0rdix RAT’s C2 L0rdix |
2019-08-01
⋅
Group-IB
⋅
Attacks by Silence Silence DDoS Kikothac Silence |
2019-08-01
⋅
McAfee
⋅
Clop Ransomware Clop |
2019-08-01
⋅
Proofpoint
⋅
LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards GUP Proxy Tool Lookback TA410 |
2019-08-01
⋅
Group-IB
⋅
Silence 2.0 - Going Global Silence |
2019-08-01
⋅
AlienVault OTX
⋅
Hexane Targeting Oil and Gas danbot |
2019-07-31
⋅
Dissecting Malware
⋅
TFW Ransomware is only your side hustle... Ordinypt |
2019-07-31
⋅
Twitter (@KevinPerlow)
⋅
Tweet on DPRK malware NetKey |
2019-07-31
⋅
Github (Alexuiop1337)
⋅
Github Repository for SoranoStealer Sorano |
2019-07-31
⋅
Proofpoint
⋅
SystemBC is like Christmas in July for SOCKS5 Malware and Exploit Kits SystemBC |
2019-07-30
⋅
Dissecting Malware
⋅
Picking Locky Locky |
2019-07-30
⋅
int 0xcc blog
⋅
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
2019-07-29
⋅
Blueliv
⋅
An analysis of a spam distribution botnet: the inner workings of Onliner Spambot OnlinerSpambot |
2019-07-29
⋅
ESET Research
⋅
Android ransomware is back FileCoder |
2019-07-28
⋅
Dissecting Malware
⋅
Third time's the charm? Analysing WannaCry samples WannaCryptor |
2019-07-26
⋅
Github (eset)
⋅
Turla Indicators of Compromise Gazer |
2019-07-26
⋅
Twitter (@a_tweeter_user)
⋅
Tweet on Malware DADJOKE |
2019-07-25
⋅
Intrusiontruth
⋅
Encore! APT17 hacked Chinese targets and offered the data for sale |
2019-07-25
⋅
ANSSI
⋅
ANALYSIS OF THE AMCACHE |