Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-03-19Palo Alto Networks Unit 42Josh Grunzweig, Tom Lancaster
Cardinal RAT Sins Again, Targets Israeli Fin-Tech Firms
EVILNUM Cardinal RAT EVILNUM
2019-03-13FlashpointJason Reaves, Joshua Platt
‘DMSniff’ POS Malware Actively Leveraged to Target Small-, Medium-Sized Businesses
DMSniff
2019-02-25Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig
Multiple ArtraDownloader Variants Used by BITTER to Target Pakistan
Artra Downloader
2019-02-13Youtube (SANS Digital Forensics & Incident Response)Josh Bryant, Robert Falcone
Hunting Webshells: Tracking TwoFace - SANS Threat Hunting Summit 2018
TwoFace
2018-11-05BromiumJosh Stroschein
Data Talks: Deeper Down the Rabbit Hole: Second-Stage Attack and a Fileless Finale
AdvisorsBot
2018-10-01Palo Alto Networks Unit 42Josh Grunzweig
NOKKI Almost Ties the Knot with DOGCALL: Reaper Group Uses New Malware to Deploy RAT
Nokki
2018-09-27Palo Alto Networks Unit 42Bryan Lee, Josh Grunzweig
New KONNI Malware attacking Eurasia and Southeast Asia
Nokki
2018-08-02Palo Alto Networks Unit 42David Fuertes, Josh Grunzweig, Kyle Wilhoit, Robert Falcone
The Gorgon Group: Slithering Between Nation State and Cybercrime
Loki Password Stealer (PWS) Nanocore RAT NjRAT Quasar RAT Remcos Revenge RAT
2018-08-02David Fuertes, Josh Grunzweig, Kyle Wilhoit, Robert Falcone
The Gorgon Group: Slithering Between Nation State and Cybercrime
The Gorgon Group
2018-06-26Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig, Tom Lancaster
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
DDKONG PLAINTEE
2018-06-26Palo Alto Networks Unit 42Brittany Ash, Josh Grunzweig, Tom Lancaster
RANCOR: Targeted Attacks in South East Asia Using PLAINTEE and DDKONG Malware Families
RANCOR
2018-06-18Department of JusticeDepartment of Justice
Joshua Adam Schulte Charged with the Unauthorized Disclosure of Classified Information and Other Offenses Relating to the Theft of Classified Material from the Central Intelligence Agency
[Vault 7/8]
2018-04-17Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig, Kyle Wilhoit, Pat Litke
SquirtDanger: The Swiss Army Knife Malware from Veteran Malware Author TheBottle
SquirtDanger
2018-03-13PhishLabsJoshua Shilko
New Variant of BankBot Banking Trojan Ups Ante, Cashes Out on Android Users
Anubis
2018-03-07Palo Alto Networks Unit 42Brandon Levene, Brittany Ash, Josh Grunzweig
Patchwork Continues to Deliver BADNEWS to the Indian Subcontinent
BadNews
2018-03-05Palo Alto Networks Unit 42Brandon Levene, Josh Grunzweig
Sure, I’ll take that! New ComboJack Malware Alters Clipboards to Steal Cryptocurrency
Combojack
2018-01-26Palo Alto Networks Unit 42Josh Grunzweig
The TopHat Campaign: Attacks Within The Middle East Region Using Popular Third-Party Services
Scote
2018-01-01AccentureAlireza Salimi, Benjamin G. McCarthy, Joshua Ray
Monero and WannaMine: The cyber-criminal cryptocurrency and miner malware of choice
WannaMine
2018-01-01AccentureBart Parys, Joshua Ray
Dragonfish delivers New Form of Elise Malware targeting ASEAN Defence Ministers' Meeting and Associates
Elise LOTUS PANDA
2018-01-01Accenture SecurityGareth Russell, Joshua Ray, Kelly Bissell, Ryan LaSalle, Uwe Kissman
LATEST CYBER ESPIONAGE MALWARE ATTACKS
LOTUS PANDA