Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-28SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors
2022-09-27SecurityScorecardVlad Pasca
A Deep Dive Into the APT28’s stealer called CredoMap
CredoMap
2022-09-26K7 SecurityGaurav Yadav
DcDcrypt Ransomware Decryptor
DcDcrypt
2022-09-23humansecuritySatori Threat Intelligence and Research Team
Poseidon’s Offspring: Charybdis and Scylla
2022-09-21MicrosoftMicrosoft Detection and Response Team (DART), Microsoft Security Experts
The art and science behind Microsoft threat hunting: Part 2
2022-09-18K7 SecurityRahul R
Raccoon back with new claws!
Raccoon
2022-09-15IT Security GuruGuru Writer
Documents For Sale on the Dark Web
Adrastea
2022-09-14CISAAustralian Cyber Security Centre (ACSC), CSE Canada, FBI, NCSC UK, NSA, U.S. Cyber Command, U.S. Department of the Treasury, US-CERT
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations
2022-09-14Security JoesFelipe Duarte
Dissecting PlugX to Extract Its Crown Jewels
PlugX
2022-09-14SecurityScorecardVlad Pasca
A Detailed Analysis of the Quantum Ransomware
Mount Locker
2022-09-12Trend MicroNitesh Surana
Security Breaks: TeamTNT’s DockerHub Credentials Leak
2022-09-08MicrosoftMicrosoft Security Threat Intelligence
Microsoft investigates Iranian attacks against the Albanian government
ZeroCleare
2022-09-08MicrosoftMicrosoft Detection and Response Team (DART), Microsoft Security Experts
The art and science behind Microsoft threat hunting: Part 1
2022-09-07MicrosoftMicrosoft Security Threat Intelligence
Profiling DEV-0270: PHOSPHORUS’ ransomware operations
2022-09-06SecurityScorecardVlad Pasca
TTPs Associated With a New Version of the BlackCat Ransomware
BlackCat
2022-09-05ResecurityResecurity
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web
2022-09-05Team CymruS2 Research Team
Mythic Case Study: Assessing Common Offensive Security Tools
2022-08-31SecurityScorecardAlex Heid, Robert Ames, Ryan Slaney
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies
2022-08-30SecurityScorecardRobert Ames
Brute Force Attempts May Have Preceded Ransomware Attack on School District
2022-08-29SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems