Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-05Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Geopolitical nation-state threat actor overview May 2021
2021-06-04AhnLabAhnLab ASEC Analysis Team
APT Attacks on Domestic Companies Using Library Files
2021-06-04RiskIQTeam RiskIQ
The Sysrv-hello Cryptojacking Botnet: Here’s What’s New
Sysrv-hello
2021-06-04K7 SecurityMary Muthu Francisca
Glupteba back on track spreading via EternalBlue exploits
Glupteba
2021-06-04Security Service of UkraineSecurity Service of Ukraine
The SBU blocked a mass cyberattack by Russian special services on the computer networks of the Ukrainian authorities
2021-06-04InkyRoger Kay
Colonial Pipeline Ransomware Hack Unleashes Flood of Related Phishing Attempts
Cobalt Strike
2021-06-04FortinetXiaopeng Zhang
Phishing Malware Hijacks Bitcoin Addresses and Delivers New Agent Tesla Variant
Agent Tesla
2021-06-04Palo Alto Networks Unit 42Nathaniel Quist
TeamTNT Actively Enumerating Cloud Environments to Infiltrate Organizations
2021-06-03SecureworksCounter Threat Unit ResearchTeam, Secureworks Adversary Group
OAuth’s Device Code Flow Abused in Phishing Attacks
2021-06-03Group-IBNikita Rostovtsev
FontPack: A dangerous update Attribution secrets: Who is behind stealing credentials and bank card data by asking to install fake Flash Player, browser or font updates?
2021-06-03ESET Researchroman kovac
ESET Threat Report T 1 2021
Kobalos Janeleiro Vadokrist
2021-06-03Bleeping ComputerSergiu Gatlan
Chinese threat actors hacked NYC MTA using Pulse Secure zero-day
2021-06-03cyblecybleinc
Deep Dive into BlackCocaine Ransomware
Epsilon Red
2021-06-02Intel 471Greg Otto
Call for crimes? Russian-language forum runs contest for cryptocurrency hacks
2021-06-02The RecordCatalin Cimpanu
Two Carbanak hackers sentenced to eight years in prison in Kazakhstan
Carbanak
2021-06-02RiskIQJennifer Grob
Review of Sysrv-hello Cryptjacking Botnet
2021-06-02Trend MicroDaniel Lunghi
Taking Advantage of PE Metadata,or How To Complete your Favorite ThreatActor’s Sample Collection (Paper)
HyperSSL
2021-06-02CrowdStrikeHeather Smith, Josh Dalman
Under Attack: Protecting Against Conti, DarkSide, REvil and Other Ransomware
DarkSide Conti DarkSide REvil
2021-06-02Microstep Online Research Response CenterMicrostep Online Research Response Center
Analysis of Lazarus's recent targeted attacks against military industry and other industries
2021-06-02Trend MicroDaniel Lunghi
Taking Advantage of PE Metadata, or How To Complete Your Favorite Threat Actor’s Sample Collection
HyperSSL