Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-23TrustwaveTrustwave SpiderLabs
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
2022-03-23vmwareSagar Daundkar, Threat Analysis Unit
SysJoker – An Analysis of a Multi-OS RAT
SysJoker SysJoker SysJoker
2022-03-23The Hacker NewsRavie Lakshmanan
abuse mikrotik router by GLUPTEBA malware
Glupteba Proxy Glupteba
2022-03-23PythonBytesIan Hellen
Tracking cyber intruders with Jupyter and Python
2022-03-23MandiantDan Scott, Elias fox, Gary Freas, Jeffery Johnson, Michael Barnhart, Michelle Cantos
Not So Lazarus: Mapping DPRK Cyber Threat Groups to Government Organizations
2022-03-23SecureworksCounter Threat Unit ResearchTeam
GOLD ULRICK Leaks Reveal Organizational Structure and Relationships
Conti Emotet IcedID TrickBot
2022-03-23SecureworksCounter Threat Unit ResearchTeam
Threat Intelligence Executive Report Volume 2022, Number 2
Conti Emotet IcedID TrickBot
2022-03-23splunkShannon Davis
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed
Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk
2022-03-23CrowdStrikeFalcon OverWatch Team
Falcon OverWatch Threat Hunting Contributes to Seamless Protection Against Novel BlackCat Attack
BlackCat
2022-03-23Team CymruAndy Kraus, Brian Eckman, Josh Hopkins, Paul Welte
Raccoon Stealer – An Insight into Victim “Gates”
Raccoon
2022-03-23BleepingComputerBill Toulas
New Mustang Panda hacking campaign targets diplomats, ISPs
PlugX
2022-03-23QianxinRed Raindrop Team
Analysis of Attack Activity of PROMETHIUM Disguised
StrongPity
2022-03-23InfoSec Handlers Diary BlogBrad Duncan
Arkei Variants: From Vidar to Mars Stealer
Arkei Stealer Mars Stealer Vidar
2022-03-23ESET ResearchAlexandre Côté Cyr
Mustang Panda’s Hodur: Old tricks, new Korplug variant
Hodur PlugX
2022-03-23MSSPAlertD. Howard Kass
LokiLocker Ransomware May Use False Flag to Avoid Identification
LokiLocker
2022-03-23KrebsOnSecurityBrian Krebs
A Closer Look at the LAPSUS$ Data Extortion Group
RedLine Stealer
2022-03-23NVISO LabsBart Parys
Hunting Emotet campaigns with Kusto
Emotet
2022-03-22Rewterz Information SecurityRewterz Information Security
Russian-Ukrainian Cyber Warfare – Rewterz Threat Intelligence Rollup
NB65
2022-03-22TrustwaveKarla Agregado
Dissecting a Phishing Campaign with a Captcha-based URL
2022-03-22360 Threat Intelligence Center360 Threat Intelligence Center
Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I)