Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-07-31Security AffairsPierluigi Paganini
Threat actor claims to have hacked European manufacturer of missiles MBDA
Adrastea
2022-07-29PICUS SecurityHüseyin Can YÜCEEL
H0lyGh0st - North Korean Threat Group Strikes Back With New Ransomware
SiennaBlue SiennaPurple Storm-0530
2022-07-28SentinelOneJames Haughom, Julien Reisdorffer, Júlio Dantas
Living Off Windows Defender | LockBit Ransomware Sideloads Cobalt Strike Through Microsoft Security Tool
Cobalt Strike LockBit
2022-07-27K7 SecurityVigneshwaran P
Credential Stealer RedLine Reemerges
RedLine Stealer
2022-07-27MicrosoftMicrosoft Security Response Center (MSRC), Microsoft Threat Intelligence Center (MSTIC), RiskIQ
Untangling KNOTWEED: European private-sector offensive actor using 0-day exploits
Subzero Denim Tsunami
2022-07-22DataBreaches.netDissent
Recent cyberattacks put Thai citizens’ privacy and data security at greater risk
Desorden Group
2022-07-18YouTube (Security Joes)Felipe Duarte
PlugX DLL Side-Loading Technique
PlugX
2022-07-18SecurityScorecardVlad Pasca
A Deep Dive Into ALPHV/BlackCat Ransomware
BlackCat
2022-07-17ResecurityResecurity
Shortcut-Based (LNK) Attacks Delivering Malicious Code On The Rise
AsyncRAT BumbleBee Emotet IcedID QakBot
2022-07-14MicrosoftMicrosoft Digital Security Unit (DSU), Microsoft Threat Intelligence Center (MSTIC)
North Korean threat actor (H0lyGh0st /DEV-0530) targets small and midsize businesses with H0lyGh0st ransomware
SiennaBlue SiennaPurple Storm-0530
2022-07-11Security AffairsPierluigi Paganini
Anubis Networks is back with new C2 server
Anubis
2022-07-08K7 SecurityHarihara Sudhan
Beware of Root Certs in VPN
2022-06-28KrebsOnSecurityBrian Krebs
The Link Between AWM Proxy & the Glupteba Botnet
Glupteba
2022-06-28GBHackers on SecurityGurubaran S
Black Basta Ransomware Emerging From Underground to Attack Corporate Networks
Black Basta
2022-06-27Socialist Republic of VietnamInformation Department of Information Security
V/v to review and prevent risks attack APT
Aoqin Dragon
2022-06-16ESET ResearchRene Holt
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet
2022-06-15Security JoesCharles Lomboni, Felipe Duarte, Venkat Rajgor
Backdoor via XFF: Mysterious Threat Actor Under Radar
CHINACHOPPER
2022-06-13SecurityScorecardVlad Pasca
A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF)
REvil
2022-06-02Packtpacktsecurity
A SecPro Super Issue: Understanding LockBit
LockBit LockBit BITWISE SPIDER
2022-06-02MicrosoftMicrosoft Digital Security Unit (DSU), Microsoft Threat Intelligence Center (MSTIC)
Exposing POLONIUM activity and infrastructure targeting Israeli organizations
POLONIUM