Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-09-14US-CERTUS-CERT
Alert (AA20-258A): Chinese Ministry of State Security-Affiliated Cyber Threat Actor Activity
2020-08-07CSIRT ItaliaCSIRT ITA
New Phishing-As-A-Service framework
2020-08-04SophosLabs UncutAnand Ajjan, Mark Loman
WastedLocker’s techniques point to a familiar heritage
WastedLocker
2020-07-29Atlantic CouncilJune Lee, Stewart Scott, Trey Herr, William Loomis
BREAKING TRUST: Shades of Crisis Across an Insecure Software Supply Chain
EternalPetya GoldenSpy Kwampirs Stuxnet
2020-07-27Trend MicroAliakbar Zahravi
Ensiko: A Webshell With Ransomware Capabilities
Ensikology
2020-07-22SentinelOneJason Reaves, Joshua Platt
Enter the Maze: Demystifying an Affiliate Involved in Maze (SNOW)
ISFB Maze TrickBot Zloader
2020-07-21The Intelligence and Security Committee of Parliament
Report on Russian disinformation campaign by Intelligence and Security Committee of Parliament
2020-07-17ProofpointSherrod DeGrippo
TA547 Pivots from Ursnif Banking Trojan to Ransomware in Australian Campaign
Adhubllka
2020-07-14Kaspersky LabsGReAT
The Tetrade: Brazilian banking malware goes global
Astaroth Grandoreiro Melcoz
2020-06-19ACSCAustralian Cyber Security Centre (ACSC)
Copy-paste compromises
Copy-Paste
2020-06-19Australian Signals DirectorateAustralian Cyber Security Centre (ACSC)
Advisory 2020-008: Copy-paste compromises - tactics, techniques and procedures used to target multiple Australian networks
Copy-Paste
2020-06-18Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
Advisory 2020-008: Copy-Paste Compromises –tactics, techniques and procedures used to target multiple Australian networks
TwoFace Cobalt Strike Empire Downloader
2020-06-05HornetsecuritySecurity Lab
Avaddon: From seeking affiliates to in-the-wild in 2 days
Avaddon
2020-05-23Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
Summary of Tradecraft Trends for 2019-20: Tactics, Techniques and Procedures Used to Target Australian Networks
2020-05-22YoroiAntonio Pirozzi, Giacomo d'Onofrio, Luca Mella, Luigi Martire
Cyber-Criminal espionage Operation insists on Italian Manufacturing
Agent Tesla
2020-05-06Seguranca InformaticaPedro Tavares
Brazilian trojan banker is targeting Portuguese users using browser overlay
2020-03-31Intel 471Intel 471
REvil Ransomware-as-a-Service – An analysis of a ransomware affiliate operation
Gandcrab REvil
2020-03-24Trend MicroEcular Xu, Elliot Cao, Joseph Chen, Lilang Wu, William Gamazo Sanchez
Technical Brief: Operation Poisoned News: Hong Kong Users Targeted with Mobile Malware via Local News Links
dmsSpy lightSpy
2020-03-24Trend MicroEcular Xu, Elliot Cao, Joseph Chen, Lilang Wu, William Gamazo Sanchez
Operation Poisoned News: Hong Kong Users Targeted With Mobile Malware via Local News Links
dmsSpy lightSpy
2020-02-05FireEyeAndrew Moore, Blaine Stancill, Genevieve Stark, Rick Cole
STOMP 2 DIS: Brilliance in the (Visual) Basics
MINEBRIDGE