Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-09-27AvastThreat Intelligence Team
Torii botnet - Not another Mirai variant
Torii
2018-09-27ESET ResearchESET Research
LoJax: First UEFI rootkit found in the wild, courtesy of the Sednit group
APT28
2018-09-27SecureworksCounter Threat Unit ResearchTeam
Cybercriminals Increasingly Trying to Ensnare the Big Financial Fish
More_eggs Cobalt
2018-09-27Bleeping ComputerIonut Ilascu
APT28 Uses LoJax, First UEFI Rootkit Seen in the Wild
APT28
2018-09-27Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig
New KONNI Malware attacking Eurasia and Southeast Asia
Nokki
2018-09-26CiscoEdmund Brumaghin
VPNFilter III: More Tools for the Swiss Army Knife of Malware
VPNFilter
2018-09-24Cisco TalosPaul Rascagnères, Robert Perica, Tomislav Pericin, Vitor Ventura
Adwind Dodges AV via DDE
AdWind
2018-09-21Qihoo 360 TechnologyQihoo 360
Poison Ivy Group and the Cyberespionage Campaign Against Chinese Military and Goverment
Poison Ivy
2018-09-21ESET ResearchESET Research
DanaBot shifts its targeting to Europe, adds new features
DanaBot
2018-09-21SonicWallSonicWall CaptureLabs Threats Research Team
VIGILANTE MALWARE REMOVES CRYPTOMINERS FROM THE INFECTED DEVICE
FBot
2018-09-20Marco Ramilli
Sustes Malware: CPU for Monero
sustes miner
2018-09-20SentinelOnePhil Stokes
On the Trail of OSX.FairyTale | Adware Playing at Malware
FailyTale
2018-09-19Antiy CERT
绿斑”行动——持续多年的攻击
2018-09-19Twitter (@LukasStefanko)Lukáš Štefanko
Tweet on Android Proxy Malware: Clientor
Clientor
2018-09-19Möbius Strip Reverse EngineeringRolf Rolles
Hex-Rays Microcode API vs. Obfuscating Compiler
Ghost RAT
2018-09-18MandiantManish Sardiwal, Muhammad Umair, Zain Gardezi
Fallout Exploit Kit Used in Malvertising Campaign to Deliver GandCrab Ransomware
Gandcrab
2018-09-18int 0xcc blogRaashid Bhat
A taste of our own medicine: How SmokeLoader is deceiving configuration extraction by using binary code as bait
SmokeLoader
2018-09-18Trend MicroJoseph C Chen
Magecart Skimming Attack Targets Mobile Users of Hotel Chain Booking Websites
magecart
2018-09-18CybereasonCybereason Nocturnus
VAI MALANDRA: A LOOK INTO THE LIFECYCLE OF BRAZILIAN FINANCIAL MALWARE: PART ONE
Overlay RAT
2018-09-18The CitizenlabBahr Abdul Razzak, Bill Marczak, John Scott-Railton, Ron Deibert, Sarah McKune
Hide and Seek: Tracking NSO Group’s Pegasus Spyware to Operations in 45 Countries
Chrysaor