Click here to download all references as Bib-File.•
2021-05-11
⋅
Qianxin
⋅
Analysis of a series of attacks by the suspected Lazarus organization using Daewoo Shipyard as relevant bait |
2021-05-10
⋅
⋅
Anheng Threat Intelligence Center
⋅
Analysis of U.S. Oil Products Pipeline Operators Suspended by Ransomware Attacks DarkSide |
2021-04-27
⋅
Positive Technologies
⋅
Lazarus Group Recruitment: Threat Hunters vs Head Hunters |
2021-04-22
⋅
xorl %eax, %eax
⋅
A gentle introduction to building a threat intelligence team |
2021-04-20
⋅
Medium Packt
⋅
What Is Cyber Threat Intelligence? |
2021-04-20
⋅
⋅
360 Threat Intelligence Center
⋅
Transparent Tribe uses the new crown vaccine hotspot to analyze the targeted attacks on the Indian medical industry Crimson RAT |
2021-04-18
⋅
Anchored Narratives on Threat Intelligence and Geopolitics
⋅
Recover your files with StrongPity StrongPity |
2021-04-09
⋅
Microsoft
⋅
Investigating a unique “form” of email delivery for IcedID malware IcedID |
2021-04-07
⋅
Nozomi Networks
⋅
Threat Intelligence: Analysis of the SBIDIOT IoT Malware SBIDIOT |
2021-04-06
⋅
Malwarebytes
⋅
A deep dive into Saint Bot, a new downloader Saint Bot |
2021-03-25
⋅
Microsoft
⋅
Analyzing attacks taking advantage of the Exchange Server vulnerabilities CHINACHOPPER |
2021-03-24
⋅
Malwarebytes
⋅
Software renewal scammers unmasked |
2021-03-18
⋅
PRODAFT Threat Intelligence
⋅
SilverFish GroupThreat Actor Report Cobalt Strike Dridex Koadic |
2021-03-08
⋅
PRODAFT Threat Intelligence
⋅
FluBot - Malware Analysis Report FluBot |
2021-03-04
⋅
Microsoft
⋅
GoldMax, GoldFinder, and Sibot: Analyzing NOBELIUM’s layered persistence SUNBURST TEARDROP UNC2452 |
2021-03-04
⋅
WMC Global
⋅
The Compact Campaign |
2021-03-02
⋅
Microsoft
⋅
HAFNIUM targeting Exchange Servers with 0-day exploits CHINACHOPPER HAFNIUM |
2021-03-02
⋅
Microsoft
⋅
HAFNIUM targeting Exchange Servers with 0-day exploits PowerCat |
2021-02-24
⋅
IBM
⋅
X-Force Threat Intelligence Index 2021 Emotet QakBot Ramnit REvil TrickBot |
2021-02-23
⋅
Medium (Katie’s Five Cents)
⋅
A Cyber Threat Intelligence Self-Study Plan: Part 1 |