Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-29AonAlex Parsons, Carly Battaile, Partha Alwar
Cloudy with a Chance of Persistent Email Access
SUNBURST
2021-01-29Trend MicroTrend Micro
Chopper ASPX web shell used in targeted attack
CHINACHOPPER MimiKatz
2021-01-28Check PointLior Sonntag
Deep into the SunBurst Attack
SUNBURST
2021-01-28Huntress LabsJohn Hammond
Analyzing Ryuk Another Link in the Cyber Attack Chain
BazarBackdoor Ryuk
2021-01-28NTTDan Saunders
Emotet disruption - Europol counterattack
Emotet
2021-01-28Palo Alto Networks Unit 42Aviv Sasson
Pro-Ocean: Rocke Group’s New Cryptojacking Malware
Pro-Ocean
2021-01-28MicrosoftMicrosoft 365 Defender Threat Intelligence Team, Microsoft Threat Intelligence Center (MSTIC)
ZINC attacks against security researchers
ComeBacker Klackring
2021-01-28axiosZach Dorfman
In cyber espionage, U.S. is both hunted and hunter
2021-01-28InfoSec Handlers Diary BlogDaniel Wesemann
Emotet vs. Windows Attack Surface Reduction
Emotet
2021-01-27KrebsOnSecurityBrian Krebs
International Action Targets Emotet Crimeware
Emotet
2021-01-27Australian Securities and Investments Commission (ASIC)Australian Securities and Investments Commission (ASIC)
Accellion cyber incident
2021-01-27laceworkChris Hall
Groundhog Botnet Rapidly Infecting Cloud
XOR DDoS
2021-01-27Department of JusticeDepartment of Justice
INDICTMENT of SEBASTIEN VACHON-DESJARDINS for using Netwalker ransomware to commit crime
Mailto
2021-01-27Department of JusticeDepartment of Justice
Department of Justice Launches Global Action Against NetWalker Ransomware
Mailto
2021-01-27IntezerPaul Litvak
How We Hacked Azure Functions and Escaped Docker
2021-01-27EurojustEurojust
World’s most dangerous malware EMOTET disrupted through global action
Emotet
2021-01-26SophosLabs UncutBill Kearney, David Anderson, Michael Heller, Peter Mackenzie, Sergio Bestulic
Nefilim Ransomware Attack Uses “Ghost” Credentials
Nefilim
2021-01-26FireEyeBernard Sapaden, Mohammed Mohsin Dalla, Rahul Mohandas, Sachin Shukla, Srini Seethapathy, Sujnani Ravindra
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication
2021-01-26FidelisChris Kubic
Ongoing Analysis of SolarWinds Impacts
SUNBURST
2021-01-26Bleeping ComputerSergiu Gatlan
Mimecast links security breach to SolarWinds hackers
SUNBURST