Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-12-23SCILabsSCILabs
Cyber Threat Profile MALTEIRO
Mispadu Malteiro
2021-12-23vmwareThreat Analysis Unit
Introducing DARTH: Distributed Analysis for Research and Threat Hunting
2021-12-23thinkbig blogAaron Jornet
Snip3, an investigation into malware
2021-12-23SymantecSiddhesh Chandrayan
Log4j Vulnerabilities: Attack Insights
Tsunami Conti Dridex Khonsari Orcus RAT TellYouThePass
2021-12-22Aqua NautilusAssaf Morag
Stopping a DreamBus Botnet Attack with Aqua’s CNDR
DreamBus Kinsing
2021-12-22ThreatrayMarkel Picado Ortiz
Establishing the TigerRAT and TigerDownloader Malware Families
TigerLite Tiger RAT
2021-12-22CISAAustralian Cyber Security Centre (ACSC), Canadian Centre for Cyber Security (CCCS), CISA, Computer Emergency Response Team New Zealand (CERT NZ), FBI, New Zealand National Cyber Security Centre (NZ NCSC), NSA, United Kingdom’s National Cyber Security Centre (NCSC-UK)
Alert (AA21-356A) Mitigating Log4Shell and Other Log4j-Related Vulnerabilities
2021-12-22Know ChuangyuKnow Chuangyu
APT Tracking Analytics: Transparent Tribe Attack Activity
Crimson RAT
2021-12-21GigamonJoe Slowik
The Log Keeps Rolling On: Evaluating Log4j Developments and Defensive Requirements
2021-12-21Twitter (@sisoma2)sisoma2
BlackCat Ransomware Linux variant
BlackCat
2021-12-21Recorded FutureCharity Wright, Insikt Group®
China’s Narrative War on Democracy
2021-12-21Cado SecurityMatt Muir
The Continued Evolution of Abcbot
Abcbot
2021-12-21SophosAndrew Brandt, Stephen Ormandy
Attackers test “CAB-less 40444” exploit in a dry run
2021-12-20IronNetBrent Eskridge, Michael Leardi, Peter Rydzynski
Detecting anomalous network traffic resulting from a successful Log4j attack
2021-12-20QianxinRed Raindrop Team
First time using a dual platform attack weapon? Analysis of the suspected SideCopy organization's attack activities against India
2021-12-20SophosSean Gallagher
Logjam: Log4j exploit attempts continue in globally distributed scans, attacks
2021-12-20InfoSec Handlers Diary BlogAlef Nula, Jan Kopriva
PowerPoint attachments, Agent Tesla and code reuse in malware
Agent Tesla
2021-12-17Netzpolitik.orgAndre Meister
Wir enthüllen den Staatstrojaner „Subzero“ aus Österreich
Subzero
2021-12-17DSIRFDSIRF
DSIRF Company Presentation
Subzero
2021-12-17SecureworksCounter Threat Unit ResearchTeam, Secureworks Incident Response Team
noPac: A Tale of Two Vulnerabilities That Could End in Ransomware