Click here to download all references as Bib-File.•
2019-12-17
⋅
Nuclear Bot Author Arrested in Sextortion Case TinyNuke Varenyky |
2019-12-17
⋅
⋅
Netlab
⋅
Lazarus Group uses Dacls RAT to attack Linux platform Dacls Log Collector Dacls |
2019-12-16
⋅
Trend Micro
⋅
Momentum Botnet's Newest DDoS Attacks and IoT Exploits Momentum |
2019-12-16
⋅
KrebsOnSecurity
⋅
Ransomware Gangs Now Outing Victim Businesses That Don’t Pay Up Maze |
2019-12-15
⋅
Bleeping Computer
⋅
Ryuk Ransomware Likely Behind New Orleans Cyberattack Ryuk |
2019-12-14
⋅
Dissecting Malware
⋅
Another one for the collection - Mespinoza (Pysa) Ransomware Mespinoza |
2019-12-13
⋅
Palo Alto Networks Unit 42
⋅
Mirai Variant ECHOBOT Resurfaces with 13 Previously Unexploited Vulnerabilities Echobot Mirai |
2019-12-13
⋅
SonicWall
⋅
LALALA InfoStealer which comes with Batch and PowerShell scripting combo LALALA Stealer |
2019-12-13
⋅
⋅
Стиллер паролей на python с отправкой на почту stealler |
2019-12-13
⋅
Twitter (@GrujaRS)
⋅
Tweet on Squad Ransomware CHCH |
2019-12-13
⋅
Threatpost
⋅
Elegant sLoad Carries Out Spying, Payload Delivery in BITS sLoad |
2019-12-12
⋅
Microsoft
⋅
GALLIUM: Targeting global telecom CHINACHOPPER Ghost RAT HTran MimiKatz Poison Ivy GALLIUM |
2019-12-12
⋅
FireEye
⋅
Cyber Threat Landscape in Japan – Revealing Threat in the Shadow Cerberus TSCookie Cobalt Strike Dtrack Emotet Formbook IcedID Icefog IRONHALO Loki Password Stealer (PWS) PandaBanker PLEAD POISONPLUG TrickBot BlackTech |
2019-12-12
⋅
Virus Bulletin
⋅
Cyber espionage in the Middle East: unravelling OSX.WindTail WindTail |
2019-12-12
⋅
Mr.Peter MrPeter |
2019-12-12
⋅
Trend Micro
⋅
More than a Dozen Obfuscated APT33 Botnets Used for Extreme Narrow Targeting APT33 |
2019-12-12
⋅
Twitter (@malwrhunterteam)
⋅
Tweet on DMR Ransomware HDMR |
2019-12-12
⋅
Bleeping Computer
⋅
Another Ransomware Will Now Publish Victims' Data If Not Paid REvil |
2019-12-11
⋅
Recorded Future
⋅
Operation Gamework: Infrastructure Overlaps Found Between BlueAlpha and Iranian APTs Gamaredon Group |
2019-12-11
⋅
Trend Micro
⋅
Waterbear Returns, Uses API Hooking to Evade Security Waterbear |