Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-01-08BlackberryMasaki Kasuya
Threat Spotlight: Amadey Bot Targets Non-Russian Users
Amadey
2020-01-08Bleeping ComputerLawrence Abrams
SNAKE Ransomware Is the Next Threat Targeting Business Networks
Snake
2020-01-01DragosDragos
North American Electric Cyber Threat Perspective
Fox Kitten
2020-01-01CynetMax Malyutin
Threat Research Report: Clipbanker – 13 Second Attack
ClipBanker
2020-01-01CrowdStrikeCrowdStrike
2019 Crowdstrike Global Threat Report
APT31
2020-01-01DragosJoe Slowik
Threat Intelligence and the Limits of Malware Analysis
Exaramel Exaramel Industroyer Lookback NjRAT PlugX
2019-12-30Check PointCheck Point
THREAT INTELLIGENCE REPORT
lampion
2019-12-24SophosSophosLabs Threat Research
Gozi V3: tracked by their own stealth
ISFB
2019-12-21Twitter (@zlab_team)Z-Lab
Tweet on Possible New Threatactor
JSOutProx
2019-12-19MalwarebytesJovi Umawing
Threat spotlight: the curious case of Ryuk ransomware
Ryuk
2019-12-13ThreatpostTara Seals
Elegant sLoad Carries Out Spying, Payload Delivery in BITS
sLoad
2019-12-12MicrosoftMicrosoft Threat Intelligence Center
GALLIUM: Targeting global telecom
CHINACHOPPER Ghost RAT HTran MimiKatz Poison Ivy GALLIUM
2019-12-12FireEyeChi-en Shen, Oleg Bondarenko
Cyber Threat Landscape in Japan – Revealing Threat in the Shadow
Cerberus TSCookie Cobalt Strike Dtrack Emotet Formbook IcedID Icefog IRONHALO Loki Password Stealer (PWS) PandaBanker PLEAD poisonplug TrickBot BlackTech
2019-12-11Threat VectorCylance Threat Research Team
Zeppelin: Russian Ransomware Targets High Profile Users in the U.S. and Europe
2019-12-05Emerging ThreatsEmerging Threats
Suricata Rules dated 2019-12-05
Unidentified 068
2019-12-04Kaspersky LabsDavid Emm
APT review: what the world’s threat actors got up to in 2019
ShaggyPanther
2019-12-03NSHCRed Alert
THREAT ACTOR TARGETING HONG KONG PRO-DEMOCRACY FIGURES
APT31
2019-12-03NSHCNSHC Threatrecon Team
Threat Actor Targeting Hong Kong Pro-Democracy Figures
sihost
2019-12-03MalwarebytesThreat Intelligence Team
New version of IcedID Trojan uses steganographic payloads
IcedID
2019-11-29DeloitteThomas Thomasen
Cyber Threat Intelligence & Incident Response
Cobalt Strike