Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-07-23ProofpointDennis Schwarz, Michael Raggi, Proofpoint Threat Insight Team
Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia
8.t Dropper Cotx RAT Poison Ivy TA428
2019-07-23GigamonEd Miles, Justin Warner, Kristina Savelesky
ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling
PoSlurp Powersniff
2019-07-22IntrusiontruthIntrusiontruth
Who is Mr Zeng?
2019-07-22One Night in NorfolkKevin Perlow
The Lazarus Injector
2019-07-22One Night in NorfolkKevin Perlow
APT33 PowerShell Malware
POWERTON
2019-07-22FortinetKai Lu
A Deep Dive Into IcedID Malware: Part III - Analysis of Child Processes
2019-07-22ProofpointKafeine, Proofpoint Threat Insight Team
BrushaLoader still sweeping up victims one year later
BrushaLoader NARWHAL SPIDER
2019-07-21One Night in NorfolkKevin Perlow
Emissary Panda DLL Backdoor
HyperSSL
2019-07-19IntrusiontruthIntrusiontruth
Who is Mr Wang?
2019-07-19Bleeping ComputerLawrence Abrams
Elusive MegaCortex Ransomware Found - Here is What We Know
MegaCortex
2019-07-19HPAlex Holland
An Analysis of L0rdix RAT, Panel and Builder
L0rdix
2019-07-18Github (ZLab-Cybaze-Yoroi)ZLab-Cybaze-Yoroi
ZLab - LooCipher Decryption Tool
2019-07-18FireEyeJessica Rocchio, Matt Bromiley, Nick Schroeder, Noah Klapprodt
Hard Pass: Declining APT34’s Invite to Join Their Professional Network
LONGWATCH PICKPOCKET TONEDEAF VALUEVAULT
2019-07-18Ahmet Bilal Can
Android Malware Analysis : Dissecting Hydra Dropper
Hydra
2019-07-18ESET ResearchZuzana Hromcová
Okrum: Ke3chang group targets diplomatic missions
Ketrican Okrum
2019-07-17IntrusiontruthIntrusiontruth
Who is Mr Guo?
2019-07-17IntezerPaul Litvak
EvilGnome: Rare Malware Spying on Linux Desktop Users
EvilGnome
2019-07-16G DataG DATA Security Lab
Analysis: Server-side polymorphism & PowerShell backdoors
Rozena
2019-07-16enSiloChen Erlich
The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable
Metamorfo
2019-07-15BlackberryBlackberry Research
Threat Spotlight: Virlock Polymorphic Ransomware
VirLock