Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-04-03DragosDragos
Allanite
ALLANITE
2019-04-03Github (Thibault-69)Thibault-69
RAT - Hodin
rat_hodin
2019-04-02Lab52Lab52
WIRTE Group attacking the Middle East
Empire Downloader Houdini WIRTE
2019-04-02SUCURISucuri
backdoor connectback
ConnectBack
2019-04-02CybereasonLior Rochberger, Matan Zatz, Noa Pinkas
Triple Threat: Emotet Deploys Trickbot to Steal Data & Spread Ryuk
Ryuk TrickBot
2019-04-02AT&TChris Doman, Jaime Blasco
Xwo - A Python-based bot scanner
Xwo
2019-04-02KrebsOnSecurityBrian Krebs
Canadian Police Raid ‘Orcus RAT’ Author
Orcus RAT
2019-04-02HelpNetSecurityZeljka Zorz
A LockerGoga primer and decrypters for Mira and Aurora ransomwares
LockerGoga
2019-04-02CylanceCylance Research, Intelligence Team
Report: OceanLotus APT Group Leveraging Steganography
Remy
2019-04-02DeepInstinctShaul Vilkomir-Preisman
New ServHelper Variant Employs Excel 4.0 Macro to Drop Signed Payload
ServHelper
2019-04-01Macnica NetworksMacnica Networks
Trends in Cyber ​​Espionage Targeting Japan 2nd Half of 2018
Anel Cobalt Strike Datper PLEAD Quasar RAT RedLeaves taidoor Zebrocy
2019-04-01Macnica NetworksMacnica Networks
OceanLotus Attack on Southeast Asian Automotive Industry
CACTUSTORCH Cobalt Strike
2019-04-01Vice MotherboardLorenzo Franceschi-Bicchierai
Prosecutors Launch Investigation Into Company That Put Malware on Google Play Store
Exodus
2019-04-01Cafe Babe
Analyzing Emotet with Ghidra — Part 1
Emotet
2019-03-29F-SecureBert Steppe
A Hammer Lurking In The Shadows
shadowhammer
2019-03-29Vice MotherboardLorenzo Franceschi-Bicchierai, Riccardo Coluccini
Researchers Find Google Play Store Apps Were Actually Government Malware
Exodus
2019-03-29Security Without BordersSecurity without Borders
Exodus: New Android Spyware Made in Italy
Exodus
2019-03-28Carbon BlackCB TAU Threat Intelligence
CryptoMix Clop Ransomware Disables Startup Repair, Removes & Edits Shadow Volume Copies
Clop
2019-03-28Vitali Kremez BlogVitali Kremez
Let's Learn: Dissecting Operation ShadowHammer Shellcode Internals in crt_ExitProcess
shadowhammer
2019-03-28F-SecureF-Secure Global
Analysis of ShadowHammer ASUS Attack First Stage Payload
shadowhammer