Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-01-12Check PointBogdan Melnykov, Elena Root
Malware Displaying Porn Ads Discovered in Game Apps on Google Play
AdultSwine
2018-01-12MediumJacob Pimental
Sonja Analysis
Snojan
2018-01-12MalwarebytesJérôme Segura
Fake Spectre and Meltdown patch pushes Smoke Loader malware
SmokeLoader
2018-01-12StormshieldRémi Jullian
Analyzing an Agent Tesla campaign: from a word document to the attacker credentials
Agent Tesla
2018-01-11Objective-SeePatrick Wardle
Ay MaMi
MaMi
2018-01-11MalwareBreakdownMalwareBreakdown
Malspam Entitled “Invoice attched for your reference” Delivers Agent Tesla Keylogger
2018-01-11Youtube (OALabs)Sergei Frankoff
Unpacking Pykspa Malware With Python and IDA Pro - Subscriber Request Part 1
Pykspa
2018-01-10WiredLouise Matsakis
Hack Brief: Russian Hackers Release Apparent IOC Emails in Wake of Olympic Ban
APT28
2018-01-10The RegisterRichard Chirgwin
Taiwanese cops give malware-laden USB sticks as prizes for security quiz
Virut
2018-01-10FreebufTencent Computer Manager
Analysis of BlackTech's latest APT attack
PLEAD
2018-01-10U.S. Department of Justice
Phillip Durachinsky Indictment
FruitFly
2018-01-09Jacquais
BestKorea
BestKorea
2018-01-09Twitter (@struppigel)Karsten Hahn
Tweet on HiddenTear Sample
HiddenTear
2018-01-08Github (YSCHGroup)YSCHGroup
SkyRAT Powershell RAT
skyrat
2018-01-06CERT.PLPaweł Srokosz
Ostap malware analysis (Backswap dropper)
ostap
2018-01-04Carnegie Endowment for International PeaceCollin Anderson, Karim Sadjapour
Iran’s Cyber Ecosystem: Who Are the Threat Actors?
Magic Kitten
2018-01-04Malware Traffic AnalysisBrad Duncan
MALSPAM PUSHING PCRAT/GH0ST
Ghost RAT
2018-01-03CyberbitHod Gavriel
New LockPoS Malware Injection Technique
LockPOS
2018-01-02Security 0wnageMo Bustami
Burping on MuddyWater
POWERSTATS
2018-01-01Council on Foreign RelationsCyber Operations Tracker
APT 35
APT35