Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-07-12DeepInstinctShaul Vilkomir-Preisman
TrickBooster – TrickBot’s Email-Based Infection Module
TrickBot
2019-07-12Twitter (@VK_intel)Vitali Kremez
ATM Malware Pin/PAN Card Offline Skimmer XFSADM
XFSADM
2019-07-11AkamaiLior Lahav
Pykspa V2 DGA Updated to Become Selective
Pykspa
2019-07-11ProofpointProofpoint Threat Insight Team
Threat Actor Profile: TA544 targets geographies from Italy to Japan with a range of malware
ISFB PandaBanker UrlZone NARWHAL SPIDER
2019-07-11InfoSec Handlers Diary BlogBrad Duncan
Recent AZORult activity
Azorult
2019-07-11NTT SecurityNTT Security
Targeted TrickBot activity drops 'PowerBrace' backdoor
PowerBrace TrickBot
2019-07-11ESET ResearchJean-Ian Boutin
Buhtrap group uses zero‑day in latest espionage campaigns
Buhtrap
2019-07-10FortinetJasper Manuel
LooCipher: Can Encrypted Files Be Recovered From Hell?
2019-07-10Check Point ResearchCheckpoint Research
Agent Smith: A New Species of Mobile Malware
Agent Smith
2019-07-10IntezerIgnacio Sanmillan
How We Seized 15 Active Ransomware Campaigns Targeting Linux File Storage Servers
QNAPCrypt
2019-07-10AnomaliThreat Research Team
The eCh0raix Ransomware
QNAPCrypt
2019-07-10Twitter (@r3c0nst)Frank Boldewin
Tweet on XFS ATM malware
XFSADM
2019-07-10CylanceCylance Threat Research Team
Flirting With IDA and APT28
PocoDown
2019-07-10Kaspersky LabsAMR, GReAT
New FinSpy iOS and Android implants revealed ITW
FinFisher
2019-07-09Cisco TalosPaul Rascagnères
Sea Turtle keeps on swimming, finds new victims, DNS hijacking techniques
Sea Turtle
2019-07-09JPCERT/CCTomoaki Tani, Yukako Uchida
Spear Phishing against Cryptocurrency Businesses
CageyChameleon
2019-07-09Talos IntelligenceDanny Adamitis, Paul Rascagnères
Sea Turtle Keeps on Swimming
2019-07-09Check PointIsrael Gubi
The 2019 Resurgence of Smokeloader
SmokeLoader
2019-07-09WikipediaVarious
Operation Newscaster
Charming Kitten
2019-07-09FortinetKai Lu
A Deep Dive Into IcedID Malware: Part I - Unpacking, Hooking and Process Injection
IcedID