Click here to download all references as Bib-File.•
2020-01-08
⋅
Bleeping Computer
⋅
SNAKE Ransomware Is the Next Threat Targeting Business Networks Snake |
2020-01-01
⋅
Dragos
⋅
WASSONITE Threat Group Wassonite |
2020-01-01
⋅
Dragos
⋅
North American Electric Cyber Threat Perspective Fox Kitten |
2020-01-01
⋅
Cynet
⋅
Threat Research Report: Clipbanker – 13 Second Attack ClipBanker |
2020-01-01
⋅
CrowdStrike
⋅
2019 Crowdstrike Global Threat Report APT31 |
2020-01-01
⋅
Dragos
⋅
Threat Intelligence and the Limits of Malware Analysis Exaramel Exaramel Industroyer Lookback NjRAT PlugX |
2019-12-30
⋅
Check Point
⋅
THREAT INTELLIGENCE REPORT lampion |
2019-12-24
⋅
Sophos
⋅
Gozi V3: tracked by their own stealth ISFB |
2019-12-19
⋅
Malwarebytes
⋅
Threat spotlight: the curious case of Ryuk ransomware Ryuk |
2019-12-12
⋅
Microsoft
⋅
GALLIUM: Targeting global telecom CHINACHOPPER Ghost RAT HTran MimiKatz Poison Ivy GALLIUM |
2019-12-12
⋅
FireEye
⋅
Cyber Threat Landscape in Japan – Revealing Threat in the Shadow Cerberus TSCookie Cobalt Strike Dtrack Emotet Formbook IcedID Icefog IRONHALO Loki Password Stealer (PWS) PandaBanker PLEAD POISONPLUG TrickBot BlackTech |
2019-12-11
⋅
Threat Vector
⋅
Zeppelin: Russian Ransomware Targets High Profile Users in the U.S. and Europe |
2019-12-04
⋅
Kaspersky Labs
⋅
APT review: what the world’s threat actors got up to in 2019 ShaggyPanther |
2019-12-03
⋅
NSHC
⋅
THREAT ACTOR TARGETING HONG KONG PRO-DEMOCRACY FIGURES APT31 |
2019-12-03
⋅
NSHC
⋅
Threat Actor Targeting Hong Kong Pro-Democracy Figures sihost |
2019-12-03
⋅
Malwarebytes
⋅
New version of IcedID Trojan uses steganographic payloads IcedID |
2019-11-29
⋅
Deloitte
⋅
Cyber Threat Intelligence & Incident Response Cobalt Strike |
2019-11-27
⋅
ThreatVector
⋅
Threat Spotlight: Machete Info-Stealer Machete |
2019-11-19
⋅
VMWare Carbon Black
⋅
Threat Analysis Unit (TAU) Threat Intelligence Notification: AsyncRAT AsyncRAT |
2019-11-18
⋅
Rewterz Information Security
⋅
REWTERZ THREAT ALERT – IRANIAN APT USES JOB SCAMS TO LURE TARGETS PoshC2 |