Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-01-01Council on Foreign RelationsCyber Operations Tracker
APT 37
APT37
2019-01-01CyberIntCyberInt
Legit Remote Admin Tools Turn into Threat Actors' Tools
RMS ServHelper TA505
2018-12-20Objective-SeePatrick Wardle
Middle East Cyber-Espionage: analyzing WindShift's implant: OSX.WindTail (part 1)
WindTail
2018-12-14Australian Cyber Security CentreASD
Investigationreport: Compromise of an Australian companyvia their Managed Service Provider
PlugX RedLeaves
2018-12-14Trend MicroAliakbar Zahravi
Cybercriminals Use Malicious Memes that Communicate with Malware
Berbomthum
2018-12-03MicrosoftMicrosoft Defender ATP Research Team
Analysis of cyberattack on U.S. think tanks, non-profits, public sector by unidentified attackers
APT29
2018-11-16CyberThreatIntelligence BlogAction09
(C)0ld Case : From Aerospace to China’s interests.
Sakula RAT
2018-11-12ccdcoeEnsar Şeker, İhsan Burak Tolga
National Cyber Security Organisation: TURKEY
2018-11-01ClearSkyClearSky Cyber Security
MuddyWater Operations in Lebanon and Oman
MuddyWater
2018-10-30Alexander Solad, Daniel Hatheway, John Fokker, Marc Rivero López
Kraken Cryptor Ransomware Gains Popularity Among Cybercriminals
Kraken
2018-10-17ESET ResearchAnton Cherepanov, Robert Lipovsky
ESET unmasks ‘GREYENERGY’ cyber-espionage group
GreyEnergy GreyEnergy
2018-10-08AT&T CybersecurityChris Doman
Delivery (Key)Boy
Titan
2018-10-04Virus BulletinAnton Cherepanov
Nomadic Octopus: cyber espionage in Central Asia
DustSquad
2018-10-03CybereasonAssaf Dahan
New Betabot campaign under the microscope
BetaBot
2018-10-01Macnica NetworksMacnica Networks
Trends in cyber espionage (targeted attacks) targeting Japan | First half of 2018
Anel Cobalt Strike Datper FlawedAmmyy Quasar RAT RedLeaves taidoor Winnti xxmm
2018-10-01SANS Cyber SummitAndrea Carcano
TRITON: How it Disrupted Safety Systems and Changed the Threat Landscape of Industrial Control Systems, Forever
Triton
2018-09-27SecureworksCounter Threat Unit ResearchTeam
Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish
More_eggs Cobalt
2018-09-21Qihoo 360 TechnologyQihoo 360
Poison Ivy Group and the Cyberespionage Campaign Against Chinese Military and Goverment
Poison Ivy
2018-09-18CybereasonCybereason Nocturnus
VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: PART ONE
Overlay RAT
2018-09-14CybereasonAmit Serper
Wannamine cryptominer that uses EternalBlue still active
WannaMine