Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-15SymantecThreat Hunter Team
Shuckworm: Russia-Linked Group Maintains Ukraine Focus
2022-08-15MicrosoftDigital Threat Analysis Center (DTAC), Microsoft Threat Intelligence Center (MSTIC), Office 365 Threat Research Team
Disrupting SEABORGIUM’s ongoing phishing operations
Callisto
2022-08-15AccidentalRebelKarlo Licudine
Malware sandbox evasion in x64 assembly by checking ram size - Part 2
2022-08-15SentinelOneVikram Navali
Detecting a Rogue Domain Controller – DCShadow Attack
MimiKatz TrickBot
2022-08-15WeixinKnow Chuangyu
Analysis of the characteristics of new activities organized by Patchwork APT in South Asia
2022-08-15F5 LabsAditya K. Sood, David Warburton, Malcolm Heath, Sander Vinberg
BlackGuard Infostealer Malware: Dissecting the State of Exfiltrated Data
BlackGuard
2022-08-15MicrosoftDigital Threat Analysis Center (DTAC), Microsoft Threat Intelligence Center (MSTIC), Office 365 Threat Research Team
Disrupting SEABORGIUM’s ongoing phishing operations
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-13AlienVault OTXAlienVault
An Analysis of Infrastructure linked to the Hagga Threat Actor
Hagga
2022-08-13SilentpushSilent Push
Early Analysis of the Twilio phishing attack-it is the tip of the iceberg
2022-08-13YoutTube (Blue Team Village)Seongsu Park
Attribution and Bias: My terrible mistakes in threat intelligence attribution
AppleJeus Olympic Destroyer
2022-08-12BrandefenseBrandefense
Mythic Leopard APT Group
Crimson RAT DarkComet NjRAT Oblique RAT Peppy RAT
2022-08-12CrowdStrikeIoan Iacob, Iulian Madalin Ionita
The Anatomy of Wiper Malware, Part 1: Common Techniques
Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare
2022-08-12FortinetOmri Misgav
The Swan Song for Driver Signature Enforcement Tampering
2022-08-12Trend MicroDaniel Lunghi, Jaromír Hořejší
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users
Rshell HyperBro Earth Berberoka
2022-08-12Trend MicroDaniel Lunghi, Jaromír Hořejší
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users (IOCs)
HyperBro
2022-08-12SekoiaThreat & Detection Research Team
LuckyMouse uses a backdoored Electron app to target MacOS
HyperBro
2022-08-12SANS ISCBrad Duncan
Monster Libra (TA551/Shathak) pushes IcedID (Bokbot) with Dark VNC and Cobalt Strike
Cobalt Strike DarkVNC IcedID
2022-08-11MorphisecArnold Osipov, Hido Cohen
APT-C-35 GETS A NEW UPGRADE
DONOT