Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-23ConfiantJerome Dangu
Uncovering 2017’s Largest Malvertising Operation
HURRICANE PANDA
2018-01-23RiskIQYonathan Klijnsma
Espionage Campaign Leverages Spear Phishing, RATs Against Turkish Defense Contractors
Remcos
2018-01-22YoroiAntonio Farina, Antonio Pirozzi, Luigi Martire
Operation EvilTraffic
EvilTraffic
2018-01-22AcronisAcronis Security
Paradise Ransomware strikes again
Paradise
2018-01-22ZDNetDanny Palmer
This hacking gang just updated the malware it uses against UK targets
Turla
2018-01-22Security AffairsPierluigi Paganini
Op EvilTraffic CSE CybSec ZLAB Malware Analysis Report – Exclusive, tens of thousands of compromised sites involved in a new massive malvertising campaign
EvilTraffic
2018-01-22Talos IntelligenceVitor Ventura
SamSam - The Evolution Continues Netting Over $325,000 in 4 Weeks
SamSam
2018-01-21Bleeping ComputerLawrence Abrams
Evrial Trojan Switches Bitcoin Addresses Copied to Windows Clipboard
Evrial
2018-01-18LookoutAndrew Blaich, Apurva Kumar, Cooper Quintin, Eva Galperin, Jeremy Richards, Michael Flossman
Dark Caracal: Cyber-espionage at a Global Scal
CrossRAT Bandook Dark Caracal
2018-01-18NetScoutKirk Soluk, Matt Bing, Pete Arzamendi
The ARC of Satori
Satori
2018-01-17Bleeping ComputerCatalin Cimpanu
Exobot Author Calls It Quits and Sells Off Banking Trojan Source Code
ExoBot
2018-01-17Malwarebyteshasherezade
A coin miner with a “Heaven’s Gate”
Coinminer
2018-01-17ESET ResearchCassius Puodzius
Zumanek: novo malware tenta roubar credenciais de serviços das vítimas
Zumanek
2018-01-17NCSC UKNCSC UK
Turla group malware
Nautilus Neuron
2018-01-17SANS ISCbrad
Reviewing the spam filters: Malspam pushing Gozi-ISFB
ISFB
2018-01-17FireEyeSwapnil Patil, Yogesh Londhe
Microsoft Office Vulnerabilities Used to Distribute Zyklon Malware in Recent Campaign
Zyklon
2018-01-17360 netlabRootKiter
Art of Steal: Satori Variant is Robbing ETH BitCoin by Replacing Wallet Address
Satori
2018-01-16Opcode Security researchntopcode
Anatomy of the thread suspension mechanism in Windows (Windows Internals)
2018-01-16Cisco TalosPaul Rascagnères, Warren Mercer
Korea In The Crosshairs
Freenki Loader RokRAT APT37
2018-01-16Midnight Blue LabsCarlo Meijer, Jos Wetzels
Analyzing the TRITON industrial malware
Triton