Click here to download all references as Bib-File.•
2018-10-24
⋅
Sensepost
⋅
Waiting for goDoH goDoH |
2018-10-23
⋅
Github (sensepost)
⋅
godoh: A DNS-over-HTTPS Command & Control Proof of Concept goDoH |
2018-10-23
⋅
FireEye
⋅
TRITON Attribution: Russian Government-Owned Lab Most Likely Built Custom Intrusion Tools for TRITON Attackers Triton |
2018-10-23
⋅
Proofpoint
⋅
sLoad and Ramnit pairing in sustained campaigns against UK and Italy sLoad |
2018-10-22
⋅
SophosLabs Uncut
⋅
Chalubo botnet wants to DDoS from your server or IoT device Chalubo |
2018-10-22
⋅
Kaspersky Labs
⋅
Mobile beasts and where to find them — part four AndroRAT |
2018-10-20
⋅
DropboxC2C DropboxC2C |
2018-10-19
⋅
Kaspersky Labs
⋅
DarkPulsar The Shadow Brokers |
2018-10-18
⋅
ESET Research
⋅
GREYENERGY: A successor to BlackEnergy Felixroot GreyEnergy |
2018-10-18
⋅
McAfee
⋅
‘Operation Oceansalt’ Attacks South Korea, U.S., and Canada With Source Code From Chinese Hacker Group Oceansalt APT1 |
2018-10-17
⋅
MITRE
⋅
Thrip Stealth Mango and Tangelo |
2018-10-17
⋅
ESET Research
⋅
ESET unmasks ‘GREYENERGY’ cyber-espionage group GreyEnergy GreyEnergy |
2018-10-17
⋅
MITRE ATT&CK
⋅
Software Description: More_eggs More_eggs |
2018-10-17
⋅
Check Point
⋅
The Emergence of the New Azorult 3.3 Azorult |
2018-10-17
⋅
ESET Research
⋅
GreyEnergy: Updated arsenal of one of the most dangerous threat actors GreyEnergy |
2018-10-17
⋅
‘Operation Oceansalt’ Delivers Wave After Wave APT1 |
2018-10-16
⋅
Peerlyst
⋅
How to understand FormBook - A New Malware-as-a-Service Formbook |
2018-10-15
⋅
fumik0 blog
⋅
Predator The Thief: In-depth analysis (v2.3.5) Predator The Thief |
2018-10-15
⋅
Kaspersky Labs
⋅
Octopus-infested seas of Central Asia Octopus DustSquad |
2018-10-14
⋅
Check Point
⋅
Godzilla Loader and the Long Tail of Malware |