Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-20laceworkChris Hall, Jared Stroud, Tom Hegel
8220 Gangs Recent use of Custom Miner and Botnet
2021-05-18CrowdStrikeKaran Sood, Liviu Arsene, Shaun Hurley
DarkSide Goes Dark: How CrowdStrike Falcon Customers Were Protected
DarkSide DarkSide
2021-05-18EllipticTom Robinson
DarkSide Ransomware has Netted Over $90 million in Bitcoin
DarkSide DarkSide
2021-05-14EllipticDr. Tom Robinson
Elliptic Follows the Bitcoin Ransoms Paid by Colonial Pipeline and Other DarkSide Ransomware Victims
DarkSide DarkSide
2021-05-12Zero DayKim Zetter
Anatomy of a $2 Million Darkside Ransomware Breach
DarkSide
2021-05-11DragosMike Hoffman, Tom Winston
Recommendations Following the Colonial Pipeline Cyber Attack
DarkSide
2021-05-10SentinelOneSentinelOne
Meet DarkSide and Their Ransomware – SentinelOne Customers Protected
DarkSide
2021-05-08The RecordCatalin Cimpanu
SolarWinds says fewer than 100 customers were impacted by supply chain attack
SUNBURST
2021-05-06Trend MicroArianne Dela Cruz, Cris Tomboc, Jayson Chong, Nikki Madayag, Sean Torre
Proxylogon: A Coinminer, a Ransomware, and a Botnet Join the Party
BlackKingdom Ransomware CHINACHOPPER Lemon Duck Prometei
2021-05-05ZscalerAniruddha Dolas, Manohar Ghule, Mohd Sadique
Catching RATs Over Custom Protocols Analysis of top non-HTTP/S threats
Agent Tesla AsyncRAT Crimson RAT CyberGate Ghost RAT Nanocore RAT NetWire RC NjRAT Quasar RAT Remcos
2021-04-26nvisoMaxime Thiebaut
Anatomy of Cobalt Strike’s DLL Stager
Cobalt Strike
2021-04-24fumik0 blogfumko
Anatomy of a simple and popular packer
2021-04-21ReutersJoseph Menn, Raphael Satter
Codecov hackers breached hundreds of restricted customer sites - sources
2021-04-19Washington ExaminerTom Rogan
Inside the CIA and NSA disagreement over Russian bounties story
2021-04-17YouTube (Worcester DEFCON Group)Joel Snape, Nettitude
Inside IcedID: Anatomy Of An Infostealer
IcedID
2021-04-17Advanced IntelligenceAl Calleo, Vitali Kremez, Yelisey Boguslavskiy
Adversary Dossier: Ryuk Ransomware Anatomy of an Attack in 2021
Ryuk
2021-04-13laceworkTom Hegel
Carbine Loader Cryptojacking Campaign
2021-04-01MicrosoftCole Sodja, Joshua Neil, Justin Carroll, Melissa Turcotte, Microsoft 365 Defender Research Team
Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
2021-03-30F-SecureF-Secure Labs
Attack landscape update: Ransomware 2.0, automated recon, and supply chain attacks
2021-03-26Bleeping ComputerLawrence Abrams
Ransomware gang urges victims’ customers to demand a ransom payment
Clop