Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-10-24SensepostLeon
Waiting for goDoH
goDoH
2018-10-23Github (sensepost)sensepost
godoh: A DNS-over-HTTPS Command & Control Proof of Concept
goDoH
2018-10-23FireEyeFireEye Intelligence
TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers
Triton
2018-10-23ProofpointProofpoint Staff
sLoad and Ramnit pairing in sustained campaigns against UK and Italy
sLoad
2018-10-22SophosLabs UncutTimothy Easton
Chalubo botnet wants to DDoS from your server or IoT device
Chalubo
2018-10-22Kaspersky LabsIlja Shatilin
Mobile beasts and where to find them — part four
AndroRAT
2018-10-200x09AL
DropboxC2C
DropboxC2C
2018-10-19Kaspersky LabsAndrey Dolgushev, Dmitry Tarakanov, Vasily Berdnikov
DarkPulsar
The Shadow Brokers
2018-10-18ESET ResearchAnton Cherepanov
GREYENERGY: A successor to BlackEnergy
Felixroot GreyEnergy
2018-10-18McAfeeAsheer Malhotra, Ryan Sherstobitoff
‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group
Oceansalt APT1
2018-10-17MITREMITRE ATT&CK
Thrip
Stealth Mango and Tangelo
2018-10-17ESET ResearchAnton Cherepanov, Robert Lipovsky
ESET unmasks ‘GREYENERGY’ cyber-espionage group
GreyEnergy GreyEnergy
2018-10-17MITRE ATT&CKMITRE
Software Description: More_eggs
More_eggs
2018-10-17Check PointIsrael Gubi
The Emergence of the New Azorult 3.3
Azorult
2018-10-17ESET ResearchAnton Cherepanov, Robert Lipovsky
GreyEnergy: Updated arsenal of one of the most dangerous threat actors
GreyEnergy
2018-10-17Raj Samani, Ryan Sherstobitoff
‘Operation Oceansalt’ Delivers Wave After Wave
APT1
2018-10-16PeerlystSudhendu
How to understand FormBook - A New Malware-as-a-Service
Formbook
2018-10-15fumik0 blogfumik0
Predator The Thief: In-depth analysis (v2.3.5)
Predator The Thief
2018-10-15Kaspersky LabsGReAT
Octopus-infested seas of Central Asia
Octopus DustSquad
2018-10-14Check PointBen Herzog
Godzilla Loader and the Long Tail of Malware