Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-21splunkBill Wright, Dave Herrald, James Brodsky, John Stoner, Kelly Huang, Marcus LaFerrerra, Michael Natkin, Mick Baccio, Ryan Kovar, Shannon Davis, Tamara Chacon
Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
2021-04-19nvisoJeroen Beckers
How to analyze mobile malware: a Cabassous/FluBot Case study
FluBot
2021-04-15Avast DecodedRomana Tesařová
HackBoss: A cryptocurrency-stealing malware distributed through Telegram
2021-04-12DataBreaches.netDissent
A chat with DarkSide
DarkSide
2021-04-12KnownsecKnownsec
APT SideWinder's latest attack on a certain region in South Asia
2021-04-06MalwarebytesHossein Jazi
Aurora campaign: Attacking Azerbaijan using multiple RATs
2021-04-05KasperskyIvan Kwiatkowski, Mark Lechtik, Pierre Delcher
The leap of a Cycldek-related threat actor
2021-03-26MIT Technology ReviewPatrick Howell O'Neill
Google’s top security teams unilaterally shut down a counterterrorism operation
2021-03-21Twitter (@CyberRaiju)Jai Minton
Twitter Thread with analysis of .NET China Chopper
CHINACHOPPER
2021-03-15TrustwaveJoshua Deacon
HAFNIUM, China Chopper and ASP.NET Runtime
CHINACHOPPER
2021-03-15Council on Foreign RelationsOmree Wechsler
The Iran-Russia Cyber Agreement and U.S. Strategy in the Middle East
2021-03-08Palo Alto Networks Unit 42Jeff White
Analyzing Attacks Against Microsoft Exchange Server With China Chopper Webshells
CHINACHOPPER
2021-02-23Medium (Katie’s Five Cents)Katie Nickels
A Cyber Threat Intelligence Self-Study Plan: Part 1
2021-02-18BitdefenderCristina Vatamanu, Gheorghe Adrian Schipor, Rickey Gevers
Iranian APT Makes a Comeback with “Thunder and Lightning” Backdoor and Espionage Combo
Infy Tonnerre
2021-02-17Palo Alto Networks Unit 42Nathaniel Quist
WatchDog: Exposing a Cryptojacking Campaign That’s Operated for Two Years
2021-02-16SophosLabs UncutMichael Heller
A Conti ransomware attack day-by-day
Conti
2021-02-10360 netlabLiu Ya
Rinfo Is Making A Comeback and Is Scanning and Mining in Full Speed
2021-02-09Trend MicroAlfredo Oliveira, David Fiser
Threat actors now target Docker via container escape features
2021-02-08WiredAndy Greenberg
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say
2021-02-02ESET ResearchIgnacio Sanmillan, Marc-Etienne M.Léveillé
Kobalos – A complex Linux threat to high performance computing infrastructure
Kobalos