Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-28GBHackers on SecurityGurubaran S
Black Basta Ransomware Emerging From Underground to Attack Corporate Networks
Black Basta
2022-06-27Socialist Republic of VietnamInformation Department of Information Security
V/v to review and prevent risks attack APT
Aoqin Dragon
2022-06-16ESET ResearchRene Holt
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet
2022-06-15Security JoesCharles Lomboni, Felipe Duarte, Venkat Rajgor
Backdoor via XFF: Mysterious Threat Actor Under Radar
CHINACHOPPER
2022-06-13SecurityScorecardVlad Pasca
A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF)
REvil
2022-06-02Packtpacktsecurity
A SecPro Super Issue: Understanding LockBit
LockBit LockBit BITWISE SPIDER
2022-06-02MicrosoftMicrosoft Digital Security Unit (DSU), Microsoft Threat Intelligence Center (MSTIC)
Exposing POLONIUM activity and infrastructure targeting Israeli organizations
POLONIUM
2022-06-01CISACISA, Department of the Treasury (Treasury), FBI, FINCEN
Joint Cybersecurity Advisory (Product ID AA22-152A): Karakurt Data Extortion Group
MimiKatz
2022-05-27PTSecurityAleksey Vishnyakov, Anton Belousov
How bootkits are implemented in modern firmware and how UEFI differs from Legacy BIOS
LoJax MoonBounce
2022-05-26AT&T CybersecurityOfer Caspi
Rapidly evolving IoT malware EnemyBot now targeting Content Management System servers and Android devices
EnemyBot
2022-05-24GBHackers on SecurityGurubaran S
Twisted Panda: Chinese APT Launch Spy Operation Against Russian Defence Institutes
2022-05-20SANS ISCXavier Mertens
A 'Zip Bomb' to Bypass Security Controls & Sandboxes
BitRAT
2022-05-18K7 SecurityLathashree K
Steer Clear of Instant Loan Apps
2022-05-18Cado SecurityMatt Muir
Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload
2022-05-17Microsoft SecurityBerman Enconado, Laurie Kirk
In hot pursuit of ‘cryware’: Defending hot wallets from attacks
Mars Stealer RedLine Stealer
2022-05-13K7 SecurityBaran S
Teabot
Anatsa
2022-05-11NTT Security HoldingsNTT Security Holdings
Analysis of an Iranian APTs “E400” PowGoop Variant Reveals Dozens of Control Servers Dating Back to 2020
PowGoop
2022-05-11K7 SecuritySaikumaravel
Transparent Tribe Targets Educational Institution
Crimson RAT
2022-05-11HPHP Wolf Security
Threat Insights Report Q1 - 2022
AsyncRAT Emotet Mekotio Vjw0rm
2022-05-11Sandfly SecurityThe Sandfly Security Team
BPFDoor - An Evasive Linux Backdoor Technical Analysis
BPFDoor