Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2018-05-09Cisco TalosChristopher Marczewski, Nick Biasini, Nick Lister
Gandcrab Ransomware Walks its Way onto Compromised Sites
Gandcrab
2018-03-20CyberScoopChris Bing, Patrick Howell O'Neill
Kaspersky's 'Slingshot' report burned an ISIS-focused intelligence operation
Slingshot
2017-12-28SpamhausSpamhaus Malware Labs
PandaZeuS’s Christmas Gift: Change in the Encryption scheme
2017-12-14FireEyeBlake Johnson, Christopher Glyer, Dan Caban, Dan Scali, Marina Krotofil, Nathan Brubaker
Attackers Deploy New ICS Attack Framework “TRITON” and Cause Operational Disruption to Critical Infrastructure
Triton TEMP.Veles
2017-12-06CiscoChristopher Marczewski, Holger Unterbrink
Recam Redux - DeConfusing ConfuserEx
NetWire RC
2017-11-14Digital GuardianChris Brook
IceID Banking Trojan Targeting Banks, Payment Card Providers, E-Commerce Sites
IcedID
2017-10-26FireEyeBarry Vengerik, Ben Read, Brian Mordosky, Christopher Glyer, Ian Ahl, Matt Williams, Michael Matonis, Nick Carr
BACKSWING - Pulling a BADRABBIT Out of a Hat
EternalPetya
2017-06-12SlideShareChristopher Doman
Open Source Malware - Sharing is caring?
HiddenTear
2017-06-05Christophe Tafani-Dereeper
Set up your own malware analysis lab with VirtualBox, INetSim and Burp
TeslaCrypt
2017-05-12Github (chrisjd20)chrisjd20
powershell_web_backdoor
powershell_web_backdoor
2017-04-18CyberScoopChris Bing
Shadow Brokers leaks show U.S. spies successfully hacked Russian, Iranian targets
The Shadow Brokers
2017-03-23FireEyeChristopher Truncer
WMImplant – A WMI Based Agentless Post-Exploitation RAT Developed in PowerShell
WMImplant
2016-10-26UnknownChris Doman
Moonlight – Targeted attacks in the Middle East
Houdini NjRAT Molerats
2016-08-23ThreatpostChris Brook
GozNym Banking Trojan Targeting German Banks
GozNym
2016-08-13CrowdStrikeChris Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
FOXY PANDA POISONUS PANDA
2016-04-25Threat PostChris Brook
Attackers Behind GozNym Trojan Set Sights on Europe
GozNym
2016-04-06ProofpointChris Wakelin
Locky Ransomware Is Becoming More Sophisticated - Cybercriminals Continue Email Campaign Innovation
Rockloader
2016-01-01CrowdStrikeChristopher Scott, Wendi Whitmore
Detecting and Responding: Pandas and Bears
ELOQUENT PANDA UNION PANDA
2015-09-16Trend MicroChristopher Budd
Operation Iron Tiger: Attackers Shift from East Asia to the United States
APT27
2015-06-24PWCChris Doman, Michael Yip
UnFIN4ished Business
WOLF SPIDER