Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-09COUNT UPON SECURITYLuis Rocha
Malware Analysis - PlugX - Part 2
PlugX
2018-05-09F5Doron Voolf
Panda Malware Broadens Targets to Cryptocurrency Exchanges and Social Media
2018-05-09Cisco TalosChristopher Marczewski, Nick Biasini, Nick Lister
Gandcrab Ransomware Walks its Way onto Compromised Sites
Gandcrab
2018-05-08Security 0wnageMo Bustami
Clearing the MuddyWater - Analysis of new MuddyWater Samples
POWERSTATS
2018-05-08AP NewsRaphael Satter
Russian hackers posed as IS to threaten military wives
APT28
2018-05-08Bleeping ComputerCatalin Cimpanu
"Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
Hide and Seek
2018-05-07BitdefenderBogdan Botezatu
Hide and Seek IoT Botnet resurfaces with new tricks, persistence
Hide and Seek
2018-05-07Kaspersky LabsAnton Ivanov, Fedor Sinitsyn, Orkhan Mamedov
SynAck targeted ransomware uses the Doppelgänging technique
SynAck
2018-05-07European Association for Secure TransactionsEuropean Association for Secure Transactions
EAST Publishes European Fraud Update 2-2018
WinPot
2018-05-04AvastAdolf Středa, Jan Širmer
Botception with Necurs: Botnet distributes script with bot capabilities
Necurs
2018-05-03Kaspersky LabsAlexey Firsh
Who’s who in the Zoo
ZooPark ZooPark
2018-05-03McAfeeItai Liba, James Walter, Ryan Sherstobitoff
Dissecting Operation Troy: Cyberespionage in South Korea
concealment_troy http_troy Lazarus Group
2018-05-03Kaspersky LabsAlexey Firsh
WHO’S WHO IN THEZOO. CYBERESPIONAGE OPERATION TARGETS ANDROID USERS IN THE MIDDLE EAST.
ZooPark
2018-05-03Kaspersky LabsAlexey Firsh
Who’s who in the Zoo
ZooPark
2018-05-03Twitter (@thor_scanner)Nextron Systems
Empire Downloader
Empire Downloader
2018-05-03ProtectWiseTom Hegel
Burning Umbrella: An Intelligence Report on the Winnti Umbrella and Associated State-Sponsored Attackers
APT41
2018-05-01FireEyeAnca Holban
M-Trends May 2018: From the field
Operation C-Major
2018-05-01NetScoutASERT Team
Lojack Becomes a Double-Agent
Computrace
2018-05-01Trend MicroRaphael Centeno
Legitimate Application AnyDesk Bundled with New Ransomware Variant
BlackRouter
2018-05-01SophosSergei Shevchenko
VPNFilter Botnet - a SophosLabs Analysis
VPNFilter