Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-01-04Medium d-hunterDoron Karmi
A Look Into Konni 2019 Campaign
Konni
2020-01-04Twitter (@Irfan_Asrar)Irfan Asrar
Tweet on Dustman
DUSTMAN
2020-01-03DayDayNewsDayDayNews
Waterbear, a cyber espionage virus, has a new variant with its own anti-virus function
Waterbear
2020-01-03Youtube (BSides Belfast)Jorge Rodriguez, Nick Summerlin
Demystifying QBot Banking Trojan
QakBot
2020-01-03Youtube (BSides Belfast)Brian Bartholomew
Nice One, Dad: Dissecting A Rare Malware Used By Leviathan
DADJOKE
2020-01-02Dissecting MalwareMarius Genheimer
"Nice decorating. Let me guess, Satan?" - Dot / MZP Ransomware
Dot Ransomware
2020-01-02FortinetArtem Semenchenko, Evengeny Ananin
DeathRansom Part II: Attribution
DeathRansom
2020-01-02FortinetMinh Tran
The Curious Case of DeathRansom: Part I
DeathRansom
2020-01-01DragosDragos
WASSONITE Threat Group
Wassonite
2020-01-01SecureworksSecureWorks
BRONZE VAPOR
BRONZE VAPOR
2020-01-01University of MaltaSteve Borg
Memory Forensics of Qakbot
QakBot
2020-01-01CrowdStrikeCrowdStrike
Cyber Front Lines Report
OUTLAW SPIDER TRAVELING SPIDER
2020-01-01FireEyeMandiant, Mitchell Clarke, Tom Hall
Mandiant IR Grab Bag of Attacker Activity
TwoFace CHINACHOPPER HyperBro HyperSSL
2020-01-01BlackberryBlackberry Research
State of Ransomware
Maze MedusaLocker Nefilim Phobos REvil Ryuk STOP
2020-01-01Trend MicroFyodor Yarochkin, Robert McArdle, Vladimir Kropotov
The Hacker Infrastructureand Underground Hosting:Services Used by Criminals
2020-01-01Palo Alto Networks Unit 42Unit42
Wastedlocker-ransomware
WastedLocker
2020-01-01DragosDragos
North American Electric Cyber Threat Perspective
Fox Kitten
2020-01-01CynetMax Malyutin
Threat Research Report: Clipbanker – 13 Second Attack
ClipBanker
2020-01-01CrowdStrikeCrowdStrike
2019 Crowdstrike Global Threat Report
APT31
2020-01-01Objective-SeePatrick Wardle
The Mac Malware of 2019
Gmera Mokes Yort