Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-28MicrosoftMicrosoft 365 Defender Threat Intelligence Team, Microsoft Threat Intelligence Center (MSTIC)
ZINC attacks against security researchers
ComeBacker Klackring
2021-01-28axiosZach Dorfman
In cyber espionage, U.S. is both hunted and hunter
2021-01-28InfoSec Handlers Diary BlogDaniel Wesemann
Emotet vs. Windows Attack Surface Reduction
Emotet
2021-01-27KrebsOnSecurityBrian Krebs
International Action Targets Emotet Crimeware
Emotet
2021-01-27Australian Securities and Investments Commission (ASIC)Australian Securities and Investments Commission (ASIC)
Accellion cyber incident
2021-01-27laceworkChris Hall
Groundhog Botnet Rapidly Infecting Cloud
XOR DDoS
2021-01-27Department of JusticeDepartment of Justice
INDICTMENT of SEBASTIEN VACHON-DESJARDINS for using Netwalker ransomware to commit crime
Mailto
2021-01-27Department of JusticeDepartment of Justice
Department of Justice Launches Global Action Against NetWalker Ransomware
Mailto
2021-01-27IntezerPaul Litvak
How We Hacked Azure Functions and Escaped Docker
2021-01-27EurojustEurojust
World’s most dangerous malware EMOTET disrupted through global action
Emotet
2021-01-26SophosLabs UncutBill Kearney, David Anderson, Michael Heller, Peter Mackenzie, Sergio Bestulic
Nefilim Ransomware Attack Uses “Ghost” Credentials
Nefilim
2021-01-26FireEyeBernard Sapaden, Mohammed Mohsin Dalla, Rahul Mohandas, Sachin Shukla, Srini Seethapathy, Sujnani Ravindra
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication
2021-01-26FidelisChris Kubic
Ongoing Analysis of SolarWinds Impacts
SUNBURST
2021-01-26Bleeping ComputerSergiu Gatlan
Mimecast links security breach to SolarWinds hackers
SUNBURST
2021-01-26360 Threat Intelligence CenterAdvanced Threat Institute
Shell Break-Lazarus (APT-C-26) organized targeted attacks against security researchers to reveal the secret
2021-01-26Anheng Threat Intelligence CenterHunting Shadow Lab
Undefeated, hackers use Visual Studio compiler features to target binary vulnerabilities security researcher
2021-01-26Trend MicroTrend Micro Research
Examining a Sodinokibi Attack
REvil
2021-01-26Medium 0xthreatintel0xthreatintel
Reversing APT Tool : SManager (Unpacked)
SManager
2021-01-25Trend MicroFyodor Yarochkin, Loseway Lu, Marshall Chen, Matsukawa Bakuei, Vladimir Kropotov
Fake Office 365 Used for Phishing Attacks on C-Suite Targets
2021-01-25CYBER GEEKS All Things InfosecCyberMasterV
A detailed analysis of ELMER Backdoor used by APT16
ELMER