Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-06-20ProofpointKafeine
AdGholas Malvertising Campaign Using Astrum EK to Deliver Mole Ransomware
Mole
2017-06-19root9broot9b
SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
PoSlurp FIN8
2017-06-19root9broot9b
SHELLTEA + POSLURP Malware Memory-resident Point-of-Sale Malware Attacks Industry
FIN8
2017-06-19Trend MicroGilbert Sison, Jeanne Jocson, Ziv Chang
Erebus Resurfaces as Linux Ransomware
Erebus
2017-06-19Cisco TalosEmmanuel Tacheau, Martin Lee, Paul Rascagnères, Vanja Svajcer, Warren Mercer
Delphi Used To Score Against Palestine
The Big Bang
2017-06-19Cisco TalosEmmanuel Tacheau, Martin Lee, Paul Rascagnères, Vanja Svajcer, Warren Mercer
Delphi Used To Score Against Palestine
Micropsia AridViper
2017-06-16FireEyeFireEye
FIN10: Anatomy of a Cyber Extortion Operation
FIN10
2017-06-15Github (ch0sys)ch0sys
DUBrute
DUBrute
2017-06-15F5Doron Voolf, Jesse Smith, Sara Boddy
Trickbot Expands Global Targets Beyond Banks and Payment Processors to CRMs
TrickBot
2017-06-15Limor Kessem
Zeus Sphinx Pushes Empty Configuration Files — What Has the Sphinx Got Cooking?
Zloader
2017-06-14Youtube (hasherezade)hasherezade
Unpacking YoungLotus malware
YoungLotus
2017-06-14ThreatConnectThreatConnect Research Team
Phantom of the Opaera: New KASPERAGENT Malware Campaign
KasperAgent AridViper
2017-06-13DragosDragos
CRASHOVERRIDE Analysis of the Threat to Electric Grid Operations
ENERGETIC BEAR
2017-06-13DragosDragos
CRASHOVERRIDE: Analysis of the Threatto Electric Grid Operations
Industroyer Sandworm
2017-06-13US-CERTUS-CERT
HIDDEN COBRA – North Korea’s DDoS Botnet Infrastructure
Lazarus Group
2017-06-13CylanceCylance Threat Research Team
Threat Spotlight: Breaking Down FF-Rat Malware
FormerFirstRAT
2017-06-12ESET ResearchAnton Cherepanov
WIN32/INDUSTROYER: A new threat for industrial control systems
Industroyer Sandworm
2017-06-12BellingcatCollin Anderson
Bahamut, Pursuing a Cyber Espionage Actor in the Middle East
Bahamut Bahamut Bahamut
2017-06-12SlideShareChristopher Doman
Open Source Malware - Sharing is caring?
HiddenTear
2017-06-12Security Art WorkJoséMiguel Holguín, Marc Salinas
Evolución de Trickbot
TrickBot