Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-09-17Palo Alto Networks Unit 42Claud Xiao, Cong Zheng, Xingyu Jin
Xbash Combines Botnet, Ransomware, Coinmining in Worm that Targets Linux and Windows
Xbash
2018-09-14CybereasonAmit Serper
Wannamine cryptominer that uses EternalBlue still active
WannaMine
2018-09-14ID RansomwareAndrew Ivanov
Rektware Ransomware
Rektware
2018-09-14NetScoutASERT Team
Tunneling Under the Sands
BONDUPDATER
2018-09-14Bleeping ComputerLawrence Abrams
Kraken Cryptor Ransomware Masquerading as SuperAntiSpyware Security Program
Kraken
2018-09-13FireEyeAyako Matsuda, Irshad Muhammad
APT10 Targeting Japanese Corporations Using Updated TTPs
APT10
2018-09-12Cryptolaemus PastedumpCryptolaemus
Emotet IOC
Emotet
2018-09-12Palo Alto Networks Unit 42Kyle Wilhoit, Robert Falcone
OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government
OilRig
2018-09-12FlashpointMike Mimoso, Paul Burbage
Malware Campaign Targeting Jaxx Cryptocurrency Wallet Users Shut Down
KPOT Stealer
2018-09-12Palo Alto Networks Unit 42Kyle Wilhoit, Robert Falcone
OilRig Uses Updated BONDUPDATER to Target Middle Eastern Government
BONDUPDATER
2018-09-12Bleeping ComputerLawrence Abrams
Feedify Hacked with Magecart Information Stealing Script
MageCart
2018-09-11Sophos Naked SecurityMark Stockley
The Rise of Targeted Ransomware
Dharma FriedEx SamSam
2018-09-11SecuronixHarshvardhan Parashar, Oleg Kolesnikov
KRONOS/Osiris Banking Trojan Attack
2018-09-11ProofpointProofpoint Staff
New modular downloaders fingerprint systems - Part 3: CobInt
CobInt
2018-09-11Bleeping ComputerIonut Ilascu
British Airways Fell Victim To Card Scraping Attack
MageCart
2018-09-10Security BoulevardGary Warner
Android Malware Intercepts SMS 2FA: We have the Logs
Anubis
2018-09-10Trend MicroIan Kenefick
A Closer Look at the Locky Poser, PyLocky Ransomware
PyLocky
2018-09-10Youtube ( Monnappa K A)Monnappa K A
turla gazer backdoor code injection & winlogon shell persistence
Gazer
2018-09-10SecurityIntelligenceLimor Kessem, Shahar Tavor
IBM X-Force Delves Into ExoBot’s Leaked Source Code
ExoBot
2018-09-10Kaspersky LabsGReAT
LuckyMouse signs malicious NDISProxy driver with certificate of Chinese IT company
Unidentified 080 APT27