Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-12-20CoderctoCodercto
Analysis of the attack activities of Hailian Lotus APT group against large domestic investment companies
CACTUSTORCH
2018-12-20Objective-SeePatrick Wardle
Middle East Cyber-Espionage: analyzing WindShift's implant: OSX.WindTail (part 1)
WindTail
2018-12-20Trend MicroAugusto Remillano II, Mark Vicente
With Mirai Comes Miori: IoT Botnet Delivered via ThinkPHP Remote Code Execution Exploit
Mirai
2018-12-20FBIFBI
Chinese Hackers Indicted - Members of APT 10 Group Targeted Intellectual Property and Confidential Business Information
APT10
2018-12-19Palo Alto Networks Unit 42Kaoru Hayashi
Analysis of Smoke Loader in New Tsunami Campaign
SmokeLoader
2018-12-19McAfeeChristiaan Beek, Jessica Saavedra-Morales, Thomas Roccia
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
Filerase
2018-12-19Malware Traffic AnalysisBrad Duncan
MALSPAM PUSHING THE MYDOOM WORM IS STILL A THING
MyDoom
2018-12-19NetScoutASERT Team
Danabot's Travels, A Global Perspective
2018-12-19Christiaan Beek, Jessica Saavedra-Morales, Thomas Roccia
Shamoon Attackers Employ New Tool Kit to Wipe Infected Systems
OilRig
2018-12-18AntiyAntiy PTA Team
“GreenSpot”Operations Grow For Many Years
GreenSpot
2018-12-18paloalto Networks Unit 42Robert Falcone
Sofacy Creates New ‘Go’ Variant of Zebrocy Tool
Zebrocy
2018-12-18Trend MicroTrendmicro
URSNIF, EMOTET, DRIDEX and BitPaymer Gangs Linked by a Similar Loader
Dridex Emotet FriedEx ISFB
2018-12-18K7 SecurityLokesh J
Scumbag Combo: Agent Tesla and XpertRAT
XpertRAT
2018-12-17Twitter (@MJDutch)Justin
Tweet on APT39
OilRig
2018-12-14SymantecCritical Attack Discovery and Intelligence Team
Shamoon: Destructive Threat Re-Emerges with New Sting in its Tail
DistTrack Filerase StoneDrill OilRig
2018-12-14Australian Cyber Security CentreASD
Investigationreport: Compromise of an Australian companyvia their Managed Service Provider
PlugX RedLeaves
2018-12-14SymantecSecurity Response Attack Investigation Team
Shamoon: Destructive Threat Re-Emerges with New Sting in its Tail
OilRig
2018-12-14Trend MicroAliakbar Zahravi
Cybercriminals Use Malicious Memes that Communicate with Malware
Berbomthum
2018-12-13Trend MicroMohamad Mokbel
Tildeb: An Implant from the Shadow Brokers’ Leak
tildeb
2018-12-13Security 0wnageMo Bustami
POWERSING - From LNK Files To Janicab Through YouTube & Twitter
Janicab