Click here to download all references as Bib-File.•
2019-04-25
⋅
FireEye
⋅
CARBANAK Week Part Four: The CARBANAK Desktop Video Player |
2019-04-25
⋅
Trend Micro
⋅
Emotet Adds New Evasion Technique Emotet |
2019-04-24
⋅
Check Point Research
⋅
Deobfuscating APT32 Flow Graphs with Cutter and Radare2 Salgorea |
2019-04-24
⋅
Weixin
⋅
"Sea Lotus" APT organization's attack techniques against China in the first quarter of 2019 revealed Cobalt Strike SOUNDBITE |
2019-04-24
⋅
Symantec
⋅
Beapy: Cryptojacking Worm Hits Enterprises in China Beapy |
2019-04-24
⋅
SpecterOps
⋅
Introducing Venator: A macOS tool for proactive detection AppleJeus WindTail |
2019-04-24
⋅
FireEye
⋅
CARBANAK Week Part Three: Behind the CARBANAK Backdoor Carbanak |
2019-04-23
⋅
Fortinet
⋅
FakeDefend FakeDefend |
2019-04-23
⋅
Kaspersky Labs
⋅
Operation ShadowHammer: a high-profile supply chain attack shadowhammer ShadowPad |
2019-04-23
⋅
Talos
⋅
DNSpionage brings out the Karkoff DNSpionage Karkoff DNSpionage |
2019-04-23
⋅
FireEye
⋅
CARBANAK Week Part Two: Continuing the CARBANAK Source Code Analysis |
2019-04-23
⋅
APT34: webmask project DNSpionage |
2019-04-22
⋅
Check Point
⋅
FINTEAM: Trojanized TeamViewer Against Government Targets FINTEAM |
2019-04-22
⋅
Trend Micro
⋅
C/C++ Runtime Library Code Tampering in Supply Chain shadowhammer ShadowPad Winnti |
2019-04-22
⋅
KrebsOnSecurity
⋅
Who’s Behind the RevCode WebMonitor RAT? WebMonitor RAT |
2019-04-22
⋅
SANS
⋅
Unpacking & Decrypting FlawedAmmyy FlawedAmmyy |
2019-04-22
⋅
Twitter (@killamjr)
⋅
Tweet on DADSTACHE payload DADSTACHE |
2019-04-22
⋅
int 0xcc blog
⋅
Dissecting Emotet’s network communication protocol Emotet |
2019-04-22
⋅
FireEye
⋅
CARBANAK Week Part One: A Rare Occurrence Carbanak |
2019-04-19
⋅
Cylance
⋅
OceanLotus Steganography |