Click here to download all references as Bib-File.•
2019-07-23
⋅
Proofpoint
⋅
Chinese APT “Operation LagTime IT” Targets Government Information Technology Agencies in Eastern Asia 8.t Dropper Cotx RAT Poison Ivy TA428 |
2019-07-23
⋅
Gigamon
⋅
ABADBABE 8BADF00D: Discovering BADHATCH and a Detailed Look at FIN8’s Tooling PoSlurp Powersniff |
2019-07-22
⋅
Intrusiontruth
⋅
Who is Mr Zeng? |
2019-07-22
⋅
One Night in Norfolk
⋅
The Lazarus Injector |
2019-07-22
⋅
One Night in Norfolk
⋅
APT33 PowerShell Malware POWERTON |
2019-07-22
⋅
Fortinet
⋅
A Deep Dive Into IcedID Malware: Part III - Analysis of Child Processes |
2019-07-22
⋅
Proofpoint
⋅
BrushaLoader still sweeping up victims one year later BrushaLoader NARWHAL SPIDER |
2019-07-21
⋅
One Night in Norfolk
⋅
Emissary Panda DLL Backdoor HyperSSL |
2019-07-19
⋅
Intrusiontruth
⋅
Who is Mr Wang? |
2019-07-19
⋅
Bleeping Computer
⋅
Elusive MegaCortex Ransomware Found - Here is What We Know MegaCortex |
2019-07-19
⋅
HP
⋅
An Analysis of L0rdix RAT, Panel and Builder L0rdix |
2019-07-18
⋅
Github (ZLab-Cybaze-Yoroi)
⋅
ZLab - LooCipher Decryption Tool |
2019-07-18
⋅
FireEye
⋅
Hard Pass: Declining APT34’s Invite to Join Their Professional Network LONGWATCH PICKPOCKET TONEDEAF VALUEVAULT |
2019-07-18
⋅
Android Malware Analysis : Dissecting Hydra Dropper Hydra |
2019-07-18
⋅
ESET Research
⋅
Okrum: Ke3chang group targets diplomatic missions Ketrican Okrum |
2019-07-17
⋅
Intrusiontruth
⋅
Who is Mr Guo? |
2019-07-17
⋅
Intezer
⋅
EvilGnome: Rare Malware Spying on Linux Desktop Users EvilGnome |
2019-07-16
⋅
G Data
⋅
Analysis: Server-side polymorphism & PowerShell backdoors Rozena |
2019-07-16
⋅
enSilo
⋅
The Avast Abuser: Metamorfo Banking Malware Hides By Abusing Avast Executable Metamorfo |
2019-07-15
⋅
Blackberry
⋅
Threat Spotlight: Virlock Polymorphic Ransomware VirLock |