Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-02forensicitguyTony Lambert
Analyzing a Magnitude EK Appx Package Dropping Magniber
Magniber
2022-01-01Symposium on Electronic Crime ResearchBenjamin Brown, Damon McCoy, Ian W. Gray, Jack Cable, Vlad Cuiujuclu
Money Over Morals: A Business Analysis of Conti Ransomware
Conti Conti
2022-01-01MalpediaPlaceholder
Malpedia Entry for PyAesLoader
PyAesLoader
2022-01-01Silent PushSilent Push
Privacy tools (not) for you
SmokeLoader
2022-01-01Silent PushAfonso Knudsen, Inês Véstia
Lapsus$ Group (DEV-0537/UNC3661) - an emerging dark net threat actor leveraging insider threats-or was it?
2022-01-01Silent PushSilent Push
Phishing infrastructure used to target US government contractors
2022-01-01Toli SecurityToli Security
Active crypto-mining operation by TeamTNT
TeamTNT
2021-12-31victory mediumZach Edwards
Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites
2021-12-31CERT.PLMarcin Dudek, Michał Praszmo
IKO activation - Malware campaign
Coper
2021-12-31InfoSec Handlers Diary BlogJan Kopriva
Do you want your Agent Tesla in the 300 MB or 8 kB package?
Agent Tesla
2021-12-29Palo Alto Networks Unit 42Daiping Liu, Jielong Xu, Wanjin Li, Zhanhao Chen
Strategically Aged Domain Detection: Capture APT Attacks With DNS Traffic Trends
Chrysaor SUNBURST
2021-12-29AquaNitzan Yaakov
Threat Alert: Evolving Attack Techniques of Autom Cryptomining Campaign
2021-12-29Nikkei AsiaRyoma Kashiwagi
Japan aerospace cyberattacks show link to Chinese military: police (PLA Unit 61419)
2021-12-28AhnLabASEC Analysis Team
APT Attack Cases of Kimsuky Group (PebbleDash)
PEBBLEDASH
2021-12-28Medium CrovaxCrovax
Extracting Hancitor’s Configuration with Ghidra part 1
Hancitor
2021-12-28CyStackChau Ha, Chau Nguyen, Duong Tran, Khoi Vu, Son Nguyen, Trung Nguyen
The attack on ONUS – A real-life case of the Log4Shell vulnerability
2021-12-28Morphus LabsRenato Marinho
Attackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons
Cobalt Strike
2021-12-28MIT Technology ReviewPatrick Howell O'Neill
The hacker-for-hire industry is now too big to fail
2021-12-28The RecordCatalin Cimpanu
Iranian hackers behind Cox Media Group ransomware attack (DEV-0270)
SamSam
2021-12-28NTTHiroki Hada
Flagpro: The new malware used by BlackTech
Flagpro