Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-30CYBER GEEKS All Things InfosecCyberMasterV
ChromeLoader Browser Hijacker
Choziosi
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-08-22Medium (Katie’s Five Cents)Katie Nickels
A Cyber Threat Intelligence Self-Study Plan: Part 2
2022-08-19ResecurityResecurity
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide
2022-08-19CybereasonMark Tsipershtein
THREAT ALERT: Inside the Redeemer 2.0 Ransomware
2022-08-18TrustwavePawel Knapczyk
Overview of the Cyber Weapons Used in the Ukraine - Russia War
AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket
2022-08-18TrustwavePawel Knapczyk
Overview of the Cyber Weapons Used in the Ukraine - Russia War
AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket
2022-08-17CybereasonCybereason Global SOC Team
Bumblebee Loader – The High Road to Enterprise Domain Control
BumbleBee Cobalt Strike
2022-08-11AccentureAccenture
How cybercriminals are weaponizing leaked ransomware data for follow-up attacks
2022-08-10Cert-UACert-UA
Cyberattacks of the UAC-0010 group (Armageddon): malicious programs GammaLoad, GammaSteel (CERT-UA#5134)
Gamaredon Group
2022-08-10CiscoNick Biasini
Cisco Talos shares insights related to recent cyber attack on Cisco
Yanluowang UNC2447
2022-08-10Cybersecurity TrendsCostin Raiu
“Pegasus”, the spyware for smartphones. How does it work and how can you protect yourself?
Chrysaor
2022-08-03CyberScoopAJ Vicens
Environmental hacktivists publish 2 terabytes of mining company emails
Guacamaya
2022-08-03TrustwaveTrustwave SpiderLabs
The Price Cybercriminals Charge for Stolen Data
2022-08-01Twitter (@sekoia_io)sekoia
Tweet on Turla's CyberAzov activity
CyberAzov
2022-07-31DataBreaches.netDissent
Thai entities continue to fall prey to cyberattacks and leaks
Desorden Group
2022-07-31BushidoToken BlogBushidoToken
Space Invaders: Cyber Threats That Are Out Of This World
Poison Ivy Raindrop SUNBURST TEARDROP WastedLocker
2022-07-27PressTVPressTV
Iraqi hacker group 'ALtahrea Team' targets Israeli IT, e-commerce companies in major cyber attack: Reports
Altahrea Team
2022-07-26CYBER GEEKS All Things InfosecCyberMasterV
HOW to Analyze Linux Malware - A Case Study of Symbiote
Symbiote
2022-07-26Cyber GeeksVlad Pasca
How To Analyze Linux Malware – A Case Study Of Symbiote
Symbiote