Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-10-06BluelivBlueliv
TrickBot banking trojan using EFLAGS as an anti-hook technique
TrickBot
2017-10-05Virus BulletinCatalin Valeriu Lita, Doina Cosovan
Linking Xpaj and Nymaim
Nymaim
2017-10-05Angel Alonso-Parrizas
Analysis of a malicious DOC used by Turla APT group; hunting persistence via PowerShell
KopiLuwak
2017-10-05Virus BulletinAnton Cherepanov, Robert Lipovsky
Industroyer: Biggest threat to industrial control systems since Stuxnet
Industroyer
2017-10-05Palo Alto Networks Unit 42Esmid Idrizovic, Juan Cortes
FreeMilk: A Highly Targeted Spear Phishing Campaign
APT37
2017-10-05FireEyeNart Villeneuve, Randi Eitzman, Sandor Nemes, Tyler Dean
Significant FormBook Distribution Campaigns Impacting the U.S. and South Korea
Formbook
2017-10-05Palo Alto Networks Unit 42Esmid Idrizovic, Juan Cortes
FreeMilk: A Highly Targeted Spear Phishing Campaign
Freenki Loader PoohMilk Loader
2017-10-05Trend MicroJaromír Hořejší
SYSCON Backdoor Uses FTP as a C&C Channel
Syscon
2017-10-04Security 0wnageMo Bustami
Continued Activity targeting the Middle East
POWERSTATS
2017-10-04CrowdStrikeKaran Sood
Protecting the Software Supply Chain: Deep Insights into the CCleaner Backdoor
CCleaner Backdoor
2017-10-04Twitter (@JohnLaTwC)John Lambert
Tweet on Turla JS backdoor
Maintools.js
2017-10-03SeqritePavankumar Chaudhari
Evolution of jRAT JAVA Malware
AdWind
2017-10-03NetScoutTJ Nelson
The Flusihoc Dynasty, A Long Standing DDoS Botnet
Flusihoc
2017-10-02IntezerJay Rosenberg
Evidence Aurora Operation Still Active Part 2: More Ties Uncovered Between CCleaner Hack & Chinese Hackers
CCleaner Backdoor
2017-10-01Threat FabricNiels Croese, Pham Duy Phuc, Wesley Gahr
LokiBot - The first hybrid Android malware
LokiBot
2017-09-29CERT.PLMichał Praszmo
Ramnit – in-depth analysis
Ramnit
2017-09-28Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone
Threat Actors Target Government of Belarus Using CMSTAR Trojan
BYEBY CMSTAR Vicious Panda
2017-09-28Palo Alto Networks Unit 42Josh Grunzweig, Robert Falcone
Threat Actors Target Government of Belarus Using CMSTAR Trojan
BYEBY CMSTAR
2017-09-28ESET ResearchMichal Poslušný, Peter Kálnai
Money‑making machine: Monero‑mining malware
Monero Miner
2017-09-27ProofpointProofpoint Staff
Threat Actor Profile: TA505, From Dridex to GlobeImposter
TA505