Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-09-17Bleeping ComputerLawrence Abrams
TFlower Ransomware - The Latest Attack Targeting Businesses
TFlower
2019-09-16MalwarebytesThreat Intelligence Team
Emotet is back: botnet springs back to life with new spam campaign
Emotet
2019-09-14Github (jeFF0Falltrades)Jeff Archer
WSH RAT (A variant of H-Worm/Houdini)
Houdini
2019-09-13MITREMITRE ATT&CK
Machete
El Machete
2019-09-12AvastAdolf Středa, Luigino Camastra
The tangle of WiryJMPer’s obfuscation
NetWire RC
2019-09-12ZscalerRohit Chaturvedi, Sahil Antil
InnfiRAT: A new RAT aiming for your cryptocurrency and more
win.innfirat
2019-09-12Github (cryptogramfan)Alex Holland
Ostap Deobfuscation script
ostap
2019-09-12Virus BulletinKamila Babayeva, Maria Rigaki, Sebastian García, Veronica Valeros
A STUDY OF MACHETE CYBER ESPIONAGE OPERATIONS IN LATIN AMERICA
Machete
2019-09-11Danny Adamitis
Autumn Aperture Report
Kimsuky
2019-09-11VolexitySean Koessel, Steven Adair
Vulnerable Private Networks: Corporate VPNs Exploited in the Wild
2019-09-11PrevailionDanny Adamitis, Elizabeth Wharton
Autumn Aperture
Kimsuky
2019-09-11Talos IntelligenceLuke DuCharme, Paul Lee
Watchbog and the Importance of Patching
kerberods
2019-09-11SecureworksCTU Research Team
COBALT DICKENS Goes Back to School…Again
Silent Librarian
2019-09-11Twitter (@VK_intel)Vitali Kremez
Tweet on Stealer/Uploader
Ryuk Stealer
2019-09-11Bleeping ComputerLawrence Abrams
Ryuk Related Malware Steals Confidential Military, Financial Files
Ryuk Stealer
2019-09-10ReversingLabsJosip Milić
Mirai Botnet Continues to Plague IoT Space
Mirai
2019-09-10Github (StrangerealIntel)StrangerealIntel
Gamaredon Analysis
Gamaredon Group
2019-09-10Twitter (@liuya0904)Liu Ya
Tweet on HandyMannyPot
HandyMannyPot
2019-09-09McAfeeChintan Shah, Marc Rivero López, Thomas Roccia
Evolution of Malware Sandbox Evasion Tactics – A Retrospective Study
Cutwail Dridex Dyre Kovter Locky Phorpiex Simda
2019-09-09Trend MicroEarle Earnshaw, Johnlery Triunfante
‘Purple Fox’ Fileless Malware with Rookit Component Delivered by Rig Exploit Kit Now Abuses PowerShell
PurpleFox