Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-21CrowdStrikeKaran Sood
An In-Depth Analysis of Samsam Ransomware and BOSS SPIDER
SamSam
2018-05-21JuniperPaul Kimayong
Nukebot Banking Trojan targeting people in France
TinyNuke
2018-05-21LACYoshihiro Ishikawa
Confirmed new attacks by APT attacker group menuPass (APT10)
Cobalt Strike
2018-05-21MegaBeetsItay Cohen
Decrypting APT33’s Dropshot Malware with Radare2 and Cutter – Part 1
DROPSHOT
2018-05-20Youtube (OALabs)Sergei Frankoff
Unpacking Gootkit Part 2 - Debugging Anti-Analysis Tricks With IDA Pro and x64dbg
GootKit
2018-05-19Xavier Mertens
Malicious Powershell Targeting UK Bank Customers
sLoad
2018-05-19Twitter (@malwrhunterteam)malwrhunterteam
Tweet on Rapid 2 ransomware
Rapid Ransom
2018-05-18LookoutAndrew Blaich, Michael Flossman
Stealth Mango and Tangelo: Nation state mobile surveillanceware stealing data from military & government officials
Stealth Mango Stealth Mango and Tangelo
2018-05-18NCC GroupNikolaos Pantazopoulos, Thomas Henry
Emissary Panda – A potential new malicious tool
HttpBrowser
2018-05-18Kaspersky LabsSuguru Ishimaru
Roaming Mantis dabbles in mining and phishing multilingually
Roaming Mantis
2018-05-18CrowdStrikeAdam Meyers
Meet CrowdStrike’s Adversary of the Month for May: MYTHIC LEOPARD
Operation C-Major
2018-05-17FidelisThreat Research Team
Gozi V3 Technical Update
ISFB
2018-05-17FortinetKenny Yang, Rommel Joven
A Wicked Family of Bots
Owari
2018-05-17Minerva LabsGal Bitensky
Analyzing an AZORult Attack – Evasion in a Cloak of Multiple Layers
Azorult
2018-05-15BSides DetroitKeven Murphy, Stefano Maccaglia
IR in Heterogeneous Environment
Korlia Poison Ivy
2018-05-15TelefonicaTelefonica
N40, the botnet created in Brazil which evolves to attack the Chilean banking sector
N40
2018-05-15ReutersHugh Lawson, Niklas Pollard, Olof Swahnberg, Simon Johnson
Swedish sports body says anti-doping unit hit by hacking attack
APT28
2018-05-15Amnesty InternationalBrave
HUMAN RIGHTS UNDER SURVEILLANCE DIGITAL THREATS AGAINST HUMAN RIGHTS DEFENDERS IN PAKISTAN
StealthAgent Crimson RAT
2018-05-15Amnesty InternationalAmnesty International
PAKISTAN: HUMAN RIGHTS UNDER SURVEILLANCE
Operation C-Major
2018-05-14Bleeping ComputerLawrence Abrams
StalinLocker Deletes Your Files Unless You Enter the Right Code
StalinLocker