Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-18K7 SecurityRahul R
Raccoon back with new claws!
Raccoon
2022-09-15IT Security GuruGuru Writer
Documents For Sale on the Dark Web
Adrastea
2022-09-14CISAAustralian Cyber Security Centre (ACSC), CSE Canada, FBI, NCSC UK, NSA, U.S. Cyber Command, U.S. Department of the Treasury, US-CERT
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations
2022-09-14Security JoesFelipe Duarte
Dissecting PlugX to Extract Its Crown Jewels
PlugX
2022-09-14SecurityScorecardVlad Pasca
A Detailed Analysis of the Quantum Ransomware
Mount Locker
2022-09-12Trend MicroNitesh Surana
Security Breaks: TeamTNT’s DockerHub Credentials Leak
2022-09-08MicrosoftMicrosoft Security Threat Intelligence
Microsoft investigates Iranian attacks against the Albanian government
ZeroCleare
2022-09-08MicrosoftMicrosoft Detection and Response Team (DART), Microsoft Security Experts
The art and science behind Microsoft threat hunting: Part 1
2022-09-07MicrosoftMicrosoft Security Threat Intelligence
Profiling DEV-0270: PHOSPHORUS’ ransomware operations
2022-09-06SecurityScorecardVlad Pasca
TTPs Associated With a New Version of the BlackCat Ransomware
BlackCat
2022-09-05ResecurityResecurity
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web
2022-09-05Team CymruS2 Research Team
Mythic Case Study: Assessing Common Offensive Security Tools
2022-08-31SecurityScorecardAlex Heid, Robert Ames, Ryan Slaney
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies
2022-08-30SecurityScorecardRobert Ames
Brute Force Attempts May Have Preceded Ransomware Attack on School District
2022-08-29SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems
2022-08-25ResecurityResecurity
COVID-19 Data Put For Sale In Dark Web
2022-08-25K7 SecurityGaurav Yaday
BleachGap Revamped
BleachGap
2022-08-24MicrosoftMicrosoft Security Experts
Looking for the ‘Sliver’ lining: Hunting for emerging command-and-control frameworks
BumbleBee Sliver
2022-08-21ResecurityResecurity
Escanor Malware Delivered In Weaponized Microsoft Office Documents
2022-08-19ResecurityResecurity
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide