Click here to download all references as Bib-File.•
2019-08-01
⋅
Group-IB
⋅
Attacks by Silence Silence DDoS Kikothac Silence |
2019-08-01
⋅
McAfee
⋅
Clop Ransomware Clop |
2019-08-01
⋅
Proofpoint
⋅
LookBack Malware Targets the United States Utilities Sector with Phishing Attacks Impersonating Engineering Licensing Boards GUP Proxy Tool Lookback TA410 |
2019-08-01
⋅
Group-IB
⋅
Silence 2.0 - Going Global Silence |
2019-08-01
⋅
AlienVault OTX
⋅
Hexane Targeting Oil and Gas danbot |
2019-07-31
⋅
Dissecting Malware
⋅
TFW Ransomware is only your side hustle... Ordinypt |
2019-07-31
⋅
Twitter (@KevinPerlow)
⋅
Tweet on DPRK malware NetKey |
2019-07-31
⋅
Github (Alexuiop1337)
⋅
Github Repository for SoranoStealer Sorano |
2019-07-31
⋅
Proofpoint
⋅
SystemBC is like Christmas in July for SOCKS5 Malware and Exploit Kits SystemBC |
2019-07-30
⋅
Dissecting Malware
⋅
Picking Locky Locky |
2019-07-30
⋅
int 0xcc blog
⋅
Practical Threat Hunting and Incidence Response : A Case of A Pony Malware Infection Pony |
2019-07-29
⋅
Blueliv
⋅
An analysis of a spam distribution botnet: the inner workings of Onliner Spambot OnlinerSpambot |
2019-07-29
⋅
ESET Research
⋅
Android ransomware is back FileCoder |
2019-07-28
⋅
Dissecting Malware
⋅
Third time's the charm? Analysing WannaCry samples WannaCryptor |
2019-07-26
⋅
Github (eset)
⋅
Turla Indicators of Compromise Gazer |
2019-07-26
⋅
Twitter (@a_tweeter_user)
⋅
Tweet on Malware DADJOKE |
2019-07-25
⋅
Intrusiontruth
⋅
Encore! APT17 hacked Chinese targets and offered the data for sale |
2019-07-25
⋅
ANSSI
⋅
ANALYSIS OF THE AMCACHE |
2019-07-25
⋅
Team Cymru
⋅
Unmasking AVE_MARIA Ave Maria |
2019-07-24
⋅
Intezer
⋅
Watching the WatchBog: New BlueKeep Scanner and Linux Exploits WatchBog |