Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-08-21Positive TechnologiesKirill Shipulin
Finding Neutrino
Neutrino
2019-08-21ThreatgenPascal Ackerman
Taking a Closer Look at the LookBack Malware Campaign – Part 1
Lookback
2019-08-21WikipediaWikipedia
Kelihos botnet
Kelihos
2019-08-20Github (SherifEldeeb)Sherif Eldeeb
Source code: TinyMet
TinyMet
2019-08-20Github (Ne0nd0g)Russel Van Tuyl
Merlin (BETA)
Merlin
2019-08-20EST SecurityEST Security
Lazarus Continues 'Movie Coin' Campaign Disguised as Calling Document Request
2019-08-19Dr. WebDr. Web
Banking trojan Bolik spreads disguised as the NordVPN app
2019-08-19EST SecurityEast Security Response Center
Konni APT organization emerges as an attack disguised as Russian document
Konni
2019-08-19FireEyeAlex Pennino, Matt Bromiley
GAME OVER: Detecting and Stopping an APT41 Operation
ACEHASH CHINACHOPPER HIGHNOON
2019-08-16ForbesZak Doffman
Warning As Devious New Android Malware Hides In Fake Adobe Flash Player Installations (Updated)
Cerberus
2019-08-15Trend MicroAliakbar Zahravi
Analysis: New Remcos RAT Arrives Via Phishing Email
Remcos
2019-08-15Sentinel LABSDaniel Bunce
Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features
GootKit
2019-08-15Twitter (@just_windex)Windex
Tweet on PoSlurp.B
PoSlurp
2019-08-15SentinelOneDaniel Bunce
Gootkit Banking Trojan | Deep Dive into Anti-Analysis Features
GootKit
2019-08-15Malwarebyteshasherezade
The Hidden Bee infection chain, part 1: the stegano pack
Hidden Bee
2019-08-15Github (jeFF0Falltrades)Jeff Archer
MICROPSIA (APT-C-23)
Micropsia
2019-08-14ESET ResearchZuzana Hromcová
In the Balkans, businesses are under fire from a double‑barreled weapon
BalkanDoor BalkanRAT
2019-08-13CyberbitHod Gavriel
HawkEye Malware Changes Keylogging Technique
HawkEye Keylogger
2019-08-13AdalogicsDavid Korczynski
The state of advanced code injections
Dridex Emotet Tinba
2019-08-13奇安信威胁情报中心
洞察人性:一起利用政治人物桃色丑闻的诱饵攻击活动披露
DADJOKE