Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-04-09ZDNetCatalin Cimpanu
Cybercrime market selling full digital fingerprints of over 60,000 users
2019-04-09Github (eset)ESET Research
Collection of helper scripts for OceanLotus
APT32
2019-04-09MalwarebytesMalwarebytes Labs
Say hello to Baldr, a new stealer on the market
Baldr
2019-04-09Chronicle SecurityJuan Andrés Guerrero-Saade, Silas Cutler
The Oldest Stuxnet Component Dials Up
FlowerShop Stuxnet
2019-04-09ESET ResearchRomain Dumont
OceanLotus: macOS malware update
OceanLotus
2019-04-09Cisco TalosVitor Ventura
Gustuff banking botnet targets Australia
Gustuff
2019-04-08SANS Cyber Security SummitTaha Karim
Trails of WindShift
WindTail ZhMimikatz
2019-04-08Palo Alto Networks Unit 42Ruchna Nigam
Mirai Compiled for New Processors Surfaces in the Wild
Mirai
2019-04-07EybisiEybisi
Mobile Malware Analysis : Tricks used in Anubis
Anubis
2019-04-07Sveatoslav Persianov
Emotet malware analysis. Part 2
Emotet
2019-04-06Youtube (hasherezade)hasherezade
Unpacking ISFB (including the custom 'PX' format)
ISFB
2019-04-05TrustwavePhil Hay, Rodel Mendrez
Spammed PNG file hides LokiBot
Loki Password Stealer (PWS)
2019-04-05Medium vishal_thakurVishal Thakur
Trickbot — a concise treatise
TrickBot
2019-04-05FireEyeAlex Pennino, Andrew Thompson, Ben Fedore, Brendan McKeague, Douglas Bienstock, Geoff Ackerman, Van Ta
Pick-Six: Intercepting a FIN6 Intrusion, an Actor Recently Tied to Ryuk and LockerGoga Ransomware
LockerGoga Ryuk FIN6
2019-04-05YoroiAntonio Pirozzi, Davide Testa
Ursnif: The Latest Evolution of the Most Popular Banking Malware
ISFB
2019-04-04Kaspersky LabsGReAT
BasBanke: Trend-setting Brazilian banking Trojan
Basbanke
2019-04-04Deutsche WelleDeutsche Welle
Bayer points finger at Wicked Panda in cyberattack
APT41
2019-04-04SecurityIntelligenceLimor Kessem, Nir Somech
IcedID Banking Trojan Spruces Up Injection Tactics to Add Stealth
IcedID
2019-04-04CrowdStrikeHarlan Carvey
Mimikatz in the Wild: Bypassing Signature-Based Detections Using the “AK47 of Cyber”
MimiKatz
2019-04-03One Night in NorfolkKevin Perlow
Possible ShadowHammer Targeting (Low Confidence)
shadowhammer