Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-18Huntress LabsMatthew Brennan
Hackers No Hashing: Randomizing API Hashes to Evade Cobalt Strike Shellcode Detection
Cobalt Strike
2022-02-18Kookmin UniversityGiyoon Kim, Jongsung Kim, Soojin Kang, Soram Kim
A Method for Decrypting Data Infected with Hive Ransomware
Hive Hive
2022-02-18The RecordCatalin Cimpanu
Academics publish method for recovering data encrypted by the Hive ransomware
Hive Hive
2022-02-18Bleeping ComputerIonut Ilascu
Conti ransomware gang takes over TrickBot malware operation
Conti TrickBot
2022-02-18YouTube (John Hammond)John Hammond
Uncovering NETWIRE Malware - Discovery & Deobfuscation
NetWire RC
2022-02-18SANS ISCXavier Mertens
Remcos RAT Delivered Through Double Compressed Archive
Remcos
2022-02-17SinaCyberAdam Kozy
Testimony before the U.S.-China Economic and Security Review Commission Hearing on “China’s Cyber Capabilities: Warfare, Espionage, and Implications for the United States”
PlugX APT26 APT41
2022-02-17ZscalerAditya Sharma, Stuti Chaturvedi
FreeCryptoScam - A New Cryptocurrency Scam That Leads to Installation of Backdoors and Stealers
DCRat
2022-02-17TrellixChristiaan Beek, Marc Elias
Looking over the nation-state actors’ shoulders: Even they have a difficult day sometimes
Empire Downloader
2022-02-17BlackberryBlackBerry Research & Intelligence Team
Threat Thursday: Arkei Infostealer Expands Reach Using SmokeLoader to Target Crypto Wallets and MFA
Arkei Stealer SmokeLoader
2022-02-17NCC GroupMichael Mullen, Richard Footman, Simon Biggs
Detecting Karakurt – an extortion focused threat actor
2022-02-17SentinelOneAmitai Ben, Shushan Ehrlich
Log4j2 In The Wild | Iranian-Aligned Threat Actor “TunnelVision” Actively Exploiting VMware Horizon
APT35
2022-02-17CofenseJake Longden
Phishers Spoof Power BI to Visualize Your Credential Data
2022-02-17Medium s2wlabS2W TALON
Tracking SugarLocker ransomware & operator
Sugar
2022-02-17Github (shhoya)Shh0ya Security Lab
VMProtect Analysis 1.0: VMP Mutation Fix
2022-02-16Trend MicroFyodor Yarochkin, Paul Pajares, Ryan Flores, Vladimir Kropotov, Zhengyu Dong
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2022-02-16Välisluureamet Estonian Foreign Intelligence ServiceVälisluureamet Estonian Foreign Intelligence Service
International Security and Estonia 2022
2022-02-16CrowdStrikeCrowdStrike
Global Threat Report 2022
Sea Turtle
2022-02-16The RecordCatalin Cimpanu
Red Cross blames hack on Zoho vulnerability, suspects APT attack
2022-02-16CISAFBI, NSA, US-CERT
Alert (AA22-047A) Russian State-Sponsored Cyber Actors Target Cleared Defense Contractor Networks to Obtain Sensitive U.S. Defense Information and Technology