Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-06-20Check PointAliaksandr Chailytko, Yaroslav Harakhavik
DanaBot Demands a Ransom Payment
DanaBot
2019-06-19YouTube (44CON Information Security Conference)Kevin O’Reilly
The Malware CAPE: Automated Extraction of Configuration and Payloads from Sophisticated Malware
PlugX
2019-06-19ProofpointProofpoint Threat Insight Team
URLZone top malware in Japan, while Emotet and LINE Phishing round out the landscape
ISFB UrlZone NARWHAL SPIDER
2019-06-19Check PointKobi Eisenkraft, Moshe Hayun
Check Point’s Threat Emulation Stops Large-Scale Phishing Campaign in Germany
Remcos
2019-06-19Twitter (@VK_intel)Vitali Kremez
Tweet on Mach-O & PE32 Payloads
PowerCat
2019-06-18Trend MicroEcular Xu, Grey Guo
Mobile Campaign ‘Bouncing Golf’ Affects Middle East
FurBall Domestic Kitten
2019-06-18Trend MicroEcular Xu, Grey Guo
Mobile Campaign ‘Bouncing Golf’ Affects Middle East (IoCs)
FurBall
2019-06-18FortinetXiaopeng Zhang
Analysis of a New HawkEye Variant
HawkEye Keylogger
2019-06-18Kaspersky LabsAnton Kuzmenko
Plurox: Modular backdoor
Plurox
2019-06-17BitdefenderBogdan Botezatu
Good riddance, GandCrab! We’re still fixing the mess you left behind
Gandcrab
2019-06-16FortinetKai Lu
A Deep Dive Into IcedID Malware: Part II - Analysis of the Core IcedID Payload (Parent Process)
IcedID
2019-06-14CofenseAaron Riley, Nick Guarino
Houdini Worm Transformed in New Phishing Attack
Houdini
2019-06-14CertegoMatteo Lodi
Malware Tales: Sodinokibi
REvil
2019-06-13Sekoiasekoia
Hunting and detecting Cobalt Strike
Cobalt Strike
2019-06-13ae CERTae CERT
Advanced Notification of Cyber Threats against Family of Malware Giving Remote Access to Computers
HyperBro HyperSSL
2019-06-13CybereasonAmit Serper, Mary Zhao
New Pervasive Worm Exploiting Linux Exim Server Vulnerability
Unidentified Linux 001
2019-06-13AkamaiLarry Cashdollar
Latest ECHOBOT: 26 Infection Vectors
Echobot
2019-06-13Bleeping ComputerLawrence Abrams
pyLocky Decryptor Released by French Authorities
PyLocky
2019-06-12GdataKarsten Hahn
Ransomware identification for the judicious analyst
Cerber Cryptowall CryptoFortress Locky PadCrypt Spora VirLock
2019-06-12Palo Alto Networks Unit 42Ruchna Nigam
Hide ‘N Seek Botnet Updates Arsenal with Exploits Against Nexus Repository Manager & ThinkPHP
Hide and Seek