Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2017-02-05VinRansomwareGregory Paul, Shaunak
Detailed threat analysis of Shamoon 2.0 Malware
DistTrack
2017-01-25MicrosoftMicrosoft Defender ATP Research Team
Detecting threat actors in recent German industrial attacks with Windows Defender ATP
APT41
2017-01-05ClearSkyClearSky Research Team
Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford
OilRig
2017-01-05ClearSkyClearSky Research Team
Iranian Threat Agent OilRig Delivers Digitally Signed Malware, Impersonates University of Oxford
OilRig
2017-01-01Positive TechnologiesPositive Technologies
COBALT STRIKES BACK: AN EVOLVING MULTINATIONAL THREAT TO FINANCE
Cobalt
2016-12-20ESET ResearchMichal Malík, Peter Kálnai
New Linux/Rakos threat: devices and servers under SSH scan (again)
Rakos
2016-12-20ESET ResearchMichal Malík, Peter Kálnai
New Linux/Rakos threat: devices and servers under SSH scan (again)
2016-11-30FortinetLilia Elena Gonzalez Medina
Bladabindi Remains A Constant Threat By Using Dynamic DNS Services
NjRAT
2016-11-09Fidelis CybersecurityThreat Research Team
Down the H-W0rm Hole with Houdini’s RAT
Blackworm RAT
2016-10-18CylanceCylance Threat Research Team
Digitally Signed Malware Targeting Gaming Companies
Excalibur
2016-10-18CylanceCylance Threat Research Team
Digitally Signed Malware Targeting Gaming Companies
PassCV
2016-10-17ThreatConnectThreatConnect
A Tale of Two Targets
HttpBrowser APT27
2016-10-15Fidelis CybersecurityThreat Research Team
TrickBot: We Missed you, Dyre
TrickBot
2016-10-01CrowdStrikeCrowdStrike
2015 Global Threat Report
MIMIC SPIDER
2016-09-28ThreatConnectThreatConnect Research Team
Belling the BEAR
Cyber Berkut
2016-09-27Talos IntelligenceEdmund Brumaghin
Threat Spotlight: GozNym
Nymaim
2016-09-20AvastThreat Intelligence Team
Inside Petya and Mischa ransomware
Petya
2016-09-14DeloitteDeloitte
The evolution of the Nymaim Criminal Enterprise Threat Intelligence & Analytics
Nymaim
2016-09-06KZ CERTKZ CERT
KZ-CERT has analyzed another sample of malicious software, which is a component of targeted attacks (Targeted attacks, Advanced Persistent Threats (APT))
Icefog
2016-08-25NJCCICNJCCIC
NJCCIC Threat Profile: Spy-Agent
TeamSpy