Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-11-26Trend MicroEcular Xu, Lorin Wu
A Look into the Connection Between XLoader and FakeSpy, and Their Possible Ties With the Yanbian Gang
FakeSpy MoqHao
2018-11-26SangforSangfor
New Lucky Ransomware Targets Linux Servers
Satan
2018-11-23CertegoMatteo Lodi
Sload hits Italy. Unveil the power of powershell as a downloader
sLoad
2018-11-22nccgroupMatt Lewis
Turla PNG Dropper is back
Uroburos Turla
2018-11-22nccgroupBen Humphrey
Turla PNG Dropper is back
Uroburos Turla
2018-11-21morMichael Gorelik
FIN7 Not Finished – Morphisec Spots New Campaign
2018-11-21Bleeping ComputerIonut Ilascu
MageCart Group Sabotages Rival to Ruin Data and Reputation
MageCart
2018-11-20Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan
APT28
2018-11-20Trend MicroJoelson Soares, Lenart Bermejo
Lazarus Continues Heists, Mounts Attacks on Financial Organizations in Latin America
BLINDTOAD
2018-11-20Palo Alto Networks Unit 42Bryan Lee, Robert Falcone
Sofacy Continues Global Attacks and Wheels Out New ‘Cannon’ Trojan
Cannon
2018-11-20enSiloBen Hunter
L0RDIX: MULTIPURPOSE ATTACK TOOL
L0rdix
2018-11-20GIthub (tillmannw)Tillmann Werner
Information, tools, and signatures around the Conficker computer worm
Conficker
2018-11-20ESET ResearchESET Research
Sednit: What’s going on with Zebrocy?
Zebrocy
2018-11-19Bleeping ComputerLawrence Abrams
VisionDirect Data Breach Caused by MageCart Attack
MageCart
2018-11-19FireEyeAndrew Thompson, Ben Withnell, Jonathan Leathery, Matthew Dunwoody, Michael Matonis, Nick Carr
Not So Cozy: An Uncomfortable Examination of a Suspected APT29 Phishing Campaign
Cobalt Strike
2018-11-18Stranded on Pylos BlogJoe
CozyBear – In from the Cold?
Cobalt Strike APT29
2018-11-17Youtube (Demonslay335)Michael Gillespie
Analyzing Ransomware - Beginner Static Analysis
Hermes
2018-11-17Youtube (Demonslay335)Michael Gillespie
Analyzing Ransomware - Reversing Basic .NET Ransomware
Smrss32
2018-11-16Trend MicroTrend Micro
Exploring Emotet: Examining Emotet’s Activities, Infrastructure
Emotet
2018-11-16Palo Alto Networks Unit 42Kyle Wilhoit, Robert Falcone
Analyzing OilRig’s Ops Tempo from Testing to Weaponization to Delivery
OilRig