Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-08-01ThreatFabricThreatFabric
Cerberus - A new banking Trojan from the underworld
Cerberus
2019-08-01BromiumAlex Holland
Decrypting L0rdix RAT’s C2
L0rdix
2019-08-01Group-IBGroup-IB
Attacks by Silence
Silence DDoS Kikothac Silence
2019-08-01McAfeeAlexandre Mundo, Marc Rivero López
Clop Ransomware
Clop
2019-08-01ProofpointDennis Schwarz, Michael Raggi, Proofpoint Threat Insight Team
LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards
GUP Proxy Tool Lookback TA410
2019-08-01Group-IBGroup-IB
Silence 2.0 - Going Global
Silence
2019-08-01AlienVault OTXAlienVault
Hexane Targeting Oil and Gas
danbot
2019-07-31Dissecting MalwareMarius Genheimer
TFW Ransomware is only your side hustle...
Ordinypt
2019-07-31Twitter (@KevinPerlow)Kevin Perlow
Tweet on DPRK malware
NetKey
2019-07-31Github (Alexuiop1337)Alexuiop1337
Github Repository for SoranoStealer
Sorano
2019-07-31ProofpointDennis Schwarz, Kade Harmon, Kafeine, Proofpoint Threat Insight Team
SystemBC is like Christmas in July for SOCKS5 Malware and Exploit Kits
SystemBC
2019-07-30Dissecting MalwareMarius Genheimer
Picking Locky
Locky
2019-07-30int 0xcc blogRaashid Bhat
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection
Pony
2019-07-29BluelivAlberto Marín
An analysis of a spam distribution botnet: the inner workings of Onliner Spambot
OnlinerSpambot
2019-07-29ESET ResearchLukáš Štefanko
Android ransomware is back
FileCoder
2019-07-28Dissecting MalwareMarius Genheimer
Third time's the charm? Analysing WannaCry samples
WannaCryptor
2019-07-26Github (eset)ESET Research
Turla Indicators of Compromise
Gazer
2019-07-26Twitter (@a_tweeter_user)a_tweeter_user
Tweet on Malware
DADJOKE
2019-07-25IntrusiontruthIntrusiontruth
Encore! APT17 hacked Chinese targets and offered the data for sale
2019-07-25ANSSIANSSI
ANALYSIS OF THE AMCACHE