Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-05Check PointGolan Cohen
Can You Trust a File’s Digital Signature? New Zloader Campaign exploits Microsoft’s Signature Verification putting users at risk
Zloader
2022-01-05ARMORArmor
Threat Intelligence Report: The Evolution of Doppel Spider from BitPaymer to Grief Ransomware
DoppelPaymer FriedEx
2022-01-05SYGNIAAmnon Kushnir, Arie Zilberstein, Boaz Wasserman, Itay Shohat, Noam Lifshitz, Oren Biderman, Yoav Mazor
Elephant Beetle: Uncovering an Organized Financial-Theft Operation
FIN13
2022-01-04SYGNIASygnia Incident Response Team
TG2003: Elephant Beetle - Uncovering an Organized Financial-theft Operation
FIN13
2022-01-04forensicitguyTony Lambert
Extracting Indicators from a Packed Mirai Sample
Mirai
2022-01-03Cluster25Cluster25
North Korean Group “KONNI” Targets The Russian Diplomatic Sector With New Versions Of Malware Implants
Konni
2022-01-03MinervaLabsNatalie Zargarov
Malicious Telegram Installer Drops Purple Fox Rootkit
PurpleFox
2022-01-02Atomic Matryoshkaz3r0day_504
"Cracking Open the Malware Piñata" Series: Intro to Dynamic Analysis with RedLineStealer
RedLine Stealer
2022-01-02Medium amgedwagehAmged Wageh
Automating The Analysis Of An AutoIT Script That Wraps A Remcos RAT
Remcos
2022-01-01aspiretsMichael Lamb
Bumblebee Malware Loader: Threat Analysis
BumbleBee
2022-01-01Dark Vortex
Brute Ratel
brute_ratel
2022-01-01Triskele LabsBrecht Snijders
Investigating a Monero Coin Miner
Coinminer
2022-01-01Silent PushAfonso Knudsen, Inês Véstia
Lapsus$ Group (DEV-0537/UNC3661) - an emerging dark net threat actor leveraging insider threats-or was it?
2022-01-01Silent PushSilent Push
Log4shell: a threat intelligence perspective
2022-01-01Silent PushSilent Push
The Manipulaters Team Blog Post
2022-01-01Toli SecurityToli Security
Active crypto-mining operation by TeamTNT
TeamTNT
2021-12-31victory mediumZach Edwards
Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites
2021-12-31CERT.PLMarcin Dudek, Michał Praszmo
IKO activation - Malware campaign
Coper
2021-12-30CloudsekAnandeshwar Unnikrishnan, Isha Tripathi
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability
Khonsari
2021-12-30InfoSec Handlers Diary BlogBrad Duncan
Agent Tesla Updates SMTP Data Exfiltration Technique
Agent Tesla