Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-15Google Project ZeroIan Beer, Samuel Groß
A deep dive into an NSO zero-click iMessage exploit: Remote Code Execution
Chrysaor
2020-12-15Cyborg SecurityAustin Jackson
Threat Hunt Deep Dives: SolarWinds Supply Chain Compromise (Solorigate / SUNBURST Backdoor)
SUNBURST
2020-12-02GoSecureMasarah Paquet-Clouston
Deep Dive into an Obfuscation-as-a-Service for Android Malware
Geost
2020-11-21vxhive blog0xastrovax
Deep Dive Into HERMES Ransomware
Hermes
2020-11-14Medium 0xastrovaxastrovax
Deep Dive Into Ryuk Ransomware
Hermes Ryuk
2020-10-28MicrosoftTom Burt
Cyberattacks target international conference attendees (APT35/PHOSPHORUS)
2020-10-27ZscalerSahil Antil, Sudeep Singh
APT-31 leverages COVID-19 vaccine theme and abuses legitimate online services
2020-10-13FortinetXiaopeng Zhang
Deep Analysis – The EKING Variant of Phobos Ransomware
Phobos
2020-10-12DeepInstinctRon Ben Yizhak
Why Emotet’s Latest Wave is Harder to Catch Than Ever Before – Part 2
Emotet
2020-09-30House Permanent Select Committee on IntelligenceHouse Permanent Select Committee on Intelligence
The China Deep Dive: A Report on the Intelligence Community’s Capabilities and Competencies with Respect to the People’s Republic of China
2020-09-29ZscalerSahil Antil, Sudeep Singh
Targeted Attacks on Oil and Gas Supply Chain Industries in the Middle East
Azorult
2020-08-25Aqua NautilusAssaf Morag
Deep Analysis of TeamTNT Techniques Using Container Images to Attack
TeamTNT Tsunami XMRIG
2020-08-12DeepInstinctRon Ben Yizhak
Why Emotet’s Latest Wave is Harder to Catch than Ever Before
Emotet
2020-07-24Medium (@velasco.l.n)Leandro Velasco
Exorcist Ransomware - From triaging to deep dive
Exorcist
2020-07-17ZscalerKaivalya Khursale, Sudeep Singh
New Voicemail-Themed Phishing Attacks Use Evasion Techniques and Steal Credentials
2020-07-15N1ght-W0lf BlogAbdallah Elshinbary
Deep Analysis of QBot Banking Trojan
QakBot
2020-07-13CofenseCharlie
Fell Deeds Awake
2020-07-10ZscalerNaveen Selvan, Rohit Chaturvedi
Deep Dive Into the M00nD3V Logger
M00nD3V Logger
2020-07-09ESET ResearchMatías Porolli
More evil: A deep look at Evilnum and its toolset
EVILNUM More_eggs EVILNUM TerraPreter TerraStealer TerraTV Evilnum
2020-07-08COLUMBIA | SIPAJennifer Keltz, John Patrick Dees, John Sakellariadis, Katherine von Ofenheim, Lan Pelekis, Matthew Armelli, Max Egar, Neal Pollard, Stuart Caudill, Vipratap Vikram Singh
Named But Hardly Shamed: What is the Impact of Information Disclosures on an APT Operations?