Click here to download all references as Bib-File.•
2018-03-08
⋅
Avast
⋅
New investigations into the CCleaner incident point to a possible third stage that had keylogger capacities CCleaner Backdoor |
2018-03-02
⋅
eideon blog
⋅
Tales of a Threat Hunter 2 Following the trace of WMI Backdoors & other nastiness |
2018-03-01
⋅
Microsoft
⋅
FinFisher exposed: A researcher’s tale of defeating traps, tricks, and complex virtual machines FinFisher RAT |
2018-02-27
⋅
ThreatVector
⋅
Threat Spotlight: Inside UDPoS Malware |
2018-02-27
⋅
VMWare Carbon Black
⋅
Threat Analysis: ROKRAT Malware RokRAT |
2018-02-21
⋅
Avast
⋅
Avast tracks down Tempting Cedar Spyware TemptingCedar Spyware |
2018-02-15
⋅
Secureworks
⋅
SamSam Ransomware Campaigns MimiKatz reGeorg SamSam BOSS SPIDER |
2018-02-15
⋅
Secureworks
⋅
SamSam: Converting Opportunity into Profit SamSam BOSS SPIDER |
2018-02-07
⋅
Cylance
⋅
Threat Spotlight: URSNIF Infostealer Malware ISFB |
2018-02-03
⋅
FireEye
⋅
Attacks Leveraging Adobe Zero-Day (CVE-2018-4878) – Threat Attribution, Attack Scenario and Recommendations TEMP.Hermit |
2018-01-16
⋅
Cylance
⋅
Threat Spotlight: LockPOS Point of Sale Malware LockPOS |
2018-01-04
⋅
Carnegie Endowment for International Peace
⋅
Iran’s Cyber Ecosystem: Who Are the Threat Actors? Magic Kitten |
2018-01-01
⋅
RiskIQ
⋅
Alphathreat Soup Burning Actors with Data |
2018-01-01
⋅
FireEye
⋅
The Forrester New Wave™: External Threat Intelligence Services, Q3 2018. APT1 |
2018-01-01
⋅
CrowdStrike
⋅
2018 Global Threat Report Mangzamel BAMBOO SPIDER HOUND SPIDER ZOMBIE SPIDER |
2017-12-19
⋅
Trend Micro
⋅
Cyberespionage Campaign Sphinx Goes Mobile With AnubisSpy AnubisSpy |
2017-12-09
⋅
BlueHat Security Conference
⋅
10 Years of Targeted Credential Phishing |
2017-12-07
⋅
FireEye
⋅
New Targeted Attack in the Middle East by APT34, a Suspected Iranian Threat Group, Using CVE-2017-11882 Exploit OilRig |
2017-12-01
⋅
FireEye
⋅
Advanced Persistent Threat Groups APT5 |
2017-11-07
⋅
ThreatVector
⋅
Locky Ransomware Locky |