Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-07Trend MicroGloria Chen, Jaromír Hořejší, Joseph C Chen, Kenney Lu
BIOPASS RAT: New Malware Sniffs Victims via Live Streaming
BIOPASS Cobalt Strike Derusbi
2021-07-06CybereasonTom Fakterman
Cybereason vs. REvil Ransomware: The Kaseya Chronicles
REvil
2021-06-29Silverado Policy AcceleratorAnne Neuberger, Dmitri Alperovitch
Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger
2021-06-17nrkEspen Kjendlie, Tormod Strand, Øyvind Bye Skille
For the first time, PST says that China (APT31) is behind a computer attack
APT31
2021-06-08ilbaroni
LOKIBOT - A commodity malware
Loki Password Stealer (PWS)
2021-06-08The RecordCatalin Cimpanu
Microsoft patches six Windows zero-days, including a commercial exploit
2021-06-01SANSJake Williams, Kevin Haley
A Contrarian View on SolarWinds
Cobalt Strike Raindrop SUNBURST TEARDROP
2021-05-22Youtube (ACPEnw)YouTube (ACPEnw)
Lessons Learned from a Cyber Attack System Admin Perspective
Ryuk
2021-05-11KrebsOnSecurityBrian Krebs
A Closer Look at the DarkSide Ransomware Gang
DarkSide
2021-05-08Group-IBSergei Kokurin
When Karma Comes Back: The rise and fall of illicit cardshop breached twice in two years
2021-05-07TEAMT5Aragorn Tseng, Charles Li
Mem2Img: Memory-Resident Malware Detection via Convolution Neural Network
Cobalt Strike PlugX Waterbear
2021-05-06Trend MicroArianne Dela Cruz, Cris Tomboc, Jayson Chong, Nikki Madayag, Sean Torre
Proxylogon: A Coinminer, a Ransomware, and a Botnet Join the Party
BlackKingdom Ransomware CHINACHOPPER Lemon Duck Prometei
2021-05-05ESET ResearchESET Research
Ousaban: Private photo collection hidden in a CABinet
Ousaban
2021-04-29The Institute for Security and TechnologyThe Institute for Security and Technology
Combating Ransomware A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force
Conti EternalPetya
2021-04-27CrowdStrikeEben Kaplan, Josh Dalman, Kamil Janton
Ransomware Preparedness: A Call to Action
Dharma GlobeImposter Maze Phobos CIRCUS SPIDER TRAVELING SPIDER
2021-04-27Trend MicroJanus Agcaoili
Hello Ransomware Uses Updated China Chopper Web Shell, SharePoint Vulnerability
CHINACHOPPER Cobalt Strike
2021-04-21splunkBill Wright, Dave Herrald, James Brodsky, John Stoner, Kelly Huang, Marcus LaFerrerra, Michael Natkin, Mick Baccio, Ryan Kovar, Shannon Davis, Tamara Chacon
Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
2021-04-19nvisoJeroen Beckers
How to analyze mobile malware: a Cabassous/FluBot Case study
FluBot
2021-04-15Avast DecodedRomana Tesařová
HackBoss: A cryptocurrency-stealing malware distributed through Telegram
2021-04-12DataBreaches.netDissent
A chat with DarkSide
DarkSide