Click here to download all references as Bib-File.•
2019-08-21
⋅
Wikipedia
⋅
Kelihos botnet Kelihos |
2019-08-20
⋅
Github (SherifEldeeb)
⋅
Source code: TinyMet TinyMet |
2019-08-20
⋅
Github (Ne0nd0g)
⋅
Merlin (BETA) Merlin |
2019-08-20
⋅
⋅
EST Security
⋅
Lazarus Continues 'Movie Coin' Campaign Disguised as Calling Document Request |
2019-08-19
⋅
Dr. Web
⋅
Banking trojan Bolik spreads disguised as the NordVPN app |
2019-08-19
⋅
⋅
EST Security
⋅
Konni APT organization emerges as an attack disguised as Russian document Konni |
2019-08-19
⋅
FireEye
⋅
GAME OVER: Detecting and Stopping an APT41 Operation ACEHASH CHINACHOPPER HIGHNOON |
2019-08-16
⋅
Forbes
⋅
Warning As Devious New Android Malware Hides In Fake Adobe Flash Player Installations (Updated) Cerberus |
2019-08-15
⋅
Trend Micro
⋅
Analysis: New Remcos RAT Arrives Via Phishing Email Remcos |
2019-08-15
⋅
Sentinel LABS
⋅
Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features GootKit |
2019-08-15
⋅
Twitter (@just_windex)
⋅
Tweet on PoSlurp.B PoSlurp |
2019-08-15
⋅
SentinelOne
⋅
Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features GootKit |
2019-08-15
⋅
Malwarebytes
⋅
The Hidden Bee infection chain, part 1: the stegano pack Hidden Bee |
2019-08-15
⋅
Github (jeFF0Falltrades)
⋅
MICROPSIA (APT-C-23) Micropsia |
2019-08-14
⋅
ESET Research
⋅
In the Balkans, businesses are under fire from a double‑barreled weapon BalkanDoor BalkanRAT |
2019-08-13
⋅
Cyberbit
⋅
HawkEye Malware Changes Keylogging Technique HawkEye Keylogger |
2019-08-13
⋅
Adalogics
⋅
The state of advanced code injections Dridex Emotet Tinba |
2019-08-12
⋅
Gdata
⋅
Malware Naming Hell Part 1: Taming the mess of AV detection names Snifula |
2019-08-12
⋅
Kaspersky Labs
⋅
Recent Cloud Atlas activity PowerShower Inception Framework |
2019-08-12
⋅
Kindred Security
⋅
An Overview of Public Platform C2’s HTML5 Encoding LOWBALL Makadocs MiniDuke RogueRobinNET RokRAT |