Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-14CISAAustralian Cyber Security Centre (ACSC), CSE Canada, FBI, NCSC UK, NSA, U.S. Cyber Command, U.S. Department of the Treasury, US-CERT
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations
2022-09-14CybereasonDerrick Masters, Loïc Castel
THREAT ANALYSIS REPORT: Abusing Notepad++ Plugins for Evasion and Persistence
Meterpreter
2022-09-13DataBreaches.netDissent
Singapore corporations making progress in preventing cyberattacks
ALTDOS
2022-09-08MandiantAlden Wahlstrom, Alice Revelli, Cameron Sabel, Jon Ford, Kelli Vanderlee, Luke McNamara, Sam Riddell
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections
2022-09-08CertfaCertfa Lab
Charming Kitten: "Can We Have A Meeting?" Important puzzle pieces of Charming Kitten's cyber espionage operations
2022-09-08CybereasonAleksandar Milenkoski, Kotaro Ogino, Yuki Shibuya
Threat Analysis Report: PlugX RAT Loader Evolution
PlugX
2022-09-08Center for European Policy AnalysisAndrei Soldatov, Irina Borogan
Russian Cyberwarfare: Unpacking the Kremlin’s Capabilities
2022-08-30CYBER GEEKS All Things InfosecCyberMasterV
ChromeLoader Browser Hijacker
Choziosi
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-08-22Medium (Katie’s Five Cents)Katie Nickels
A Cyber Threat Intelligence Self-Study Plan: Part 2
2022-08-19ResecurityResecurity
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide
2022-08-19CybereasonMark Tsipershtein
THREAT ALERT: Inside the Redeemer 2.0 Ransomware
2022-08-18TrustwavePawel Knapczyk
Overview of the Cyber Weapons Used in the Ukraine - Russia War
AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket
2022-08-18TrustwavePawel Knapczyk
Overview of the Cyber Weapons Used in the Ukraine - Russia War
AcidRain CaddyWiper Cobalt Strike CredoMap DCRat DoubleZero GraphSteel GrimPlant HermeticWiper INDUSTROYER2 InvisiMole IsaacWiper PartyTicket
2022-08-17CybereasonCybereason Global SOC Team
Bumblebee Loader – The High Road to Enterprise Domain Control
BumbleBee Cobalt Strike
2022-08-11AccentureAccenture
How cybercriminals are weaponizing leaked ransomware data for follow-up attacks
2022-08-10Cert-UACert-UA
Cyberattacks of the UAC-0010 group (Armageddon): malicious programs GammaLoad, GammaSteel (CERT-UA#5134)
Gamaredon Group
2022-08-10CiscoNick Biasini
Cisco Talos shares insights related to recent cyber attack on Cisco
Yanluowang UNC2447
2022-08-10Cybersecurity TrendsCostin Raiu
“Pegasus”, the spyware for smartphones. How does it work and how can you protect yourself?
Chrysaor
2022-08-03CyberScoopAJ Vicens
Environmental hacktivists publish 2 terabytes of mining company emails
Guacamaya