Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-08MicrosoftMicrosoft Detection and Response Team (DART), Microsoft Security Experts
The art and science behind Microsoft threat hunting: Part 1
2022-09-07MicrosoftMicrosoft Security Threat Intelligence
Profiling DEV-0270: PHOSPHORUS’ ransomware operations
2022-09-06SecurityScorecardVlad Pasca
TTPs Associated With a New Version of the BlackCat Ransomware
BlackCat
2022-09-05ResecurityResecurity
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web
2022-09-05Team CymruS2 Research Team
Mythic Case Study: Assessing Common Offensive Security Tools
2022-08-31SecurityScorecardAlex Heid, Robert Ames, Ryan Slaney
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies
2022-08-30SecurityScorecardRobert Ames
Brute Force Attempts May Have Preceded Ransomware Attack on School District
2022-08-29SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems
2022-08-25ResecurityResecurity
COVID-19 Data Put For Sale In Dark Web
2022-08-25K7 SecurityGaurav Yaday
BleachGap Revamped
BleachGap
2022-08-24MicrosoftMicrosoft Security Experts
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks
BumbleBee Sliver
2022-08-21ResecurityResecurity
Escanor Malware Delivered In Weaponized Microsoft Office Documents
2022-08-19ResecurityResecurity
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide
2022-08-16ThreatFabricThreatFabric
BugDrop: the first malware trying to circumvent Google's security Controls
Xenomorph
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-11SecurityScorecardRobert Ames
The Increase in Ransomware Attacks on Local Governments
BlackCat BlackCat Cobalt Strike LockBit
2022-08-10K7 SecurityBaran S
spynote
SpyNote
2022-08-10Cybersecurity TrendsCostin Raiu
“Pegasus”, the spyware for smartphones. How does it work and how can you protect yourself?
Chrysaor
2022-08-07ResecurityResecurity
LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities