Click here to download all references as Bib-File.•
2019-09-23
⋅
Random RE
⋅
Diving into Pluroxs DNS based protection layer Plurox |
2019-09-22
⋅
Check Point Research
⋅
Rancor: The Year of The Phish 8.t Dropper Cobalt Strike |
2019-09-22
⋅
Proofpoint
⋅
LookBack Forges Ahead: Continued Targeting of the United States’ Utilities Sector Reveals Additional Adversary TTPs Lookback TA410 |
2019-09-20
⋅
Trend Micro
⋅
Mac Malware that Spoofs Trading App Steals User Information, Uploads it to Website Gmera |
2019-09-20
⋅
Canadian Centre for Cyber Security
⋅
TFlower Ransomware Campaign TFlower |
2019-09-20
⋅
SNORT Mailing Lists
⋅
Multiple signatures 032 Laturo Stealer |
2019-09-20
⋅
Intezer
⋅
Russian Cybercrime Group FullofDeep Behind QNAPCrypt Ransomware Campaigns QNAPCrypt |
2019-09-19
⋅
GitHub (werkamsus)
⋅
Lilith Lilith |
2019-09-19
⋅
Emissary Panda APT: Recent infrastructure and RAT analysis ZXShell |
2019-09-19
⋅
NSHC
⋅
Hagga of SectorH01 continues abusing Bitly, Blogger and Pastebin to deliver RevengeRAT and NanoCore Nanocore RAT Revenge RAT |
2019-09-19
⋅
Trend Micro
⋅
Fileless Cryptocurrency-Miner GhostMiner Weaponizes WMI Objects, Kills Other Cryptocurrency-Mining Payloads GhostMiner |
2019-09-18
⋅
SophosLabs Uncut
⋅
The WannaCry hangover WannaCryptor |
2019-09-18
⋅
Symantec
⋅
Tortoiseshell Group Targets IT Providers in Saudi Arabia in Probable Supply Chain Attacks SysKit Tortoiseshell |
2019-09-18
⋅
IronNet
⋅
Chirp of the PoisonFrog BONDUPDATER |
2019-09-18
⋅
JPCERT/CC
⋅
Malware Used by BlackTech after Network Intrusion PLEAD |
2019-09-17
⋅
SophosLabs
⋅
WannaCry Aftershock WannaCryptor |
2019-09-17
⋅
Fortinet
⋅
Nemty Ransomware 1.0: A Threat in its Early Stage Nemty |
2019-09-17
⋅
Talos
⋅
Cryptocurrency miners aren’t dead yet: Documenting the voracious but simple “Panda” Ghost RAT |
2019-09-17
⋅
Bleeping Computer
⋅
TFlower Ransomware - The Latest Attack Targeting Businesses TFlower |
2019-09-16
⋅
Malwarebytes
⋅
Emotet is back: botnet springs back to life with new spam campaign Emotet |