Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-01BleepingComputerIonut Ilascu
Babuk ransomware is back, uses new version on corporate networks
Babuk
2021-06-30BleepingComputerLawrence Abrams
Leaked Babuk Locker ransomware builder used in new attacks
Babuk
2021-06-29Twitter (@IntezerLabs)Intezer
Tweet on unknown elf backdoor based on an open source remote shell named "amcsh"
BioSet
2021-06-29FacebookJessica Romero
Combating E-Commerce Scams and Account Takeover Attacks
2021-06-29AccentureAccenture Security
HADES ransomware operators continue attacks
Cobalt Strike Hades MimiKatz
2021-06-29Silverado Policy AcceleratorAnne Neuberger, Dmitri Alperovitch
Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger
2021-06-29Silverado Policy AcceleratorAnne Neuberger, Dmitri Alperovitch
Cyber Strategy in the Biden Era: A Conversation with Anne Neuberger
2021-06-29VERSION2Mads Lorenzen
Danmarks National Bank hacked as part of 'the world's most sophisticated hacker attack' (NOBELIUM)
2021-06-29ProofpointDaniel Blackford, Selena Larson
Cobalt Strike: Favorite Tool from APT to Crimeware
Cobalt Strike
2021-06-29YoroiLuca Mella, Luigi Martire
The "WayBack” Campaign: a Large Scale Operation Hiding in Plain Sight
Agent Tesla Cobian RAT Oski Stealer
2021-06-29YoroiLuca Mella, Luigi Martire
The "WayBack” Campaign: a Large Scale Operation Hiding in Plain Sight
Agent Tesla Cobian RAT Oski Stealer
2021-06-28Vice MotherboardLorenzo Franceschi-Bicchierai
Hackers Tricked Microsoft Into Certifying Malware That Could Spy on Users
NetfilterRootkit
2021-06-28Trend MicroTrend Micro
Nefilim Ransomware Attack Through a MITRE Att&ck Lens
Nefilim
2021-06-28Konrad Adenauer StiftungStefan Soesanto
Outward Defense: Comparing the Cyber Defense Postures of Japan, the Netherlands and the United States in Peace Time
2021-06-28CrowdStrikeAlexandru Ghita
New Ransomware Variant Uses Golang Packer
FiveHands HelloKitty
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25KrCertDongwook Kim, Kayoung Kim, Seulgi Lee, Taewoo Lee
Attack patterns in AD environment
Clop
2021-06-25MicrosoftMSRC Team
New Nobelium activity