Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-30MicrosoftMicrosoft 365 Defender Threat Intelligence Team, Microsoft Threat Intelligence Center (MSTIC)
Threat actor (BISMUTH) leverages coin miner techniques to stay under the radar – here’s how to spot them
Cobalt Strike
2020-11-27CYBER GEEKS All Things InfosecCyberMasterV
Dissecting APT21 samples using a step-by-step approach
NetTraveler
2020-11-27MacnicaHiroshi Takeuchi
Analyzing Organizational Invasion Ransom Incidents Using Dtrack
Cobalt Strike Dtrack
2020-11-27Objective-SeePatrick Wardle
Adventures in Anti-Gravity (Part II) Deconstructing the Mac Variant of GravityRAT
2020-11-27Trend MicroLuis Magisa, Steven Du
New MacOS Backdoor Connected to OceanLotus Surfaces
OceanLotus APT32
2020-11-27Marco Ramilli's BlogMarco Ramilli
Threat Actor: Unkown
Unidentified JS 004
2020-11-27PTSecurityAlexey Vishnyakov, Denis Goydenko
Investigation with a twist: an accidental APT attack and averted data destruction
TwoFace CHINACHOPPER HyperBro MegaCortex MimiKatz
2020-11-27HPAlex Holland
Aggah Campaign’s Latest Tactics: Victimology, PowerPoint Dropper and Cryptocurrency Stealer
Agent Tesla
2020-11-26Medium SebdravenSébastien Larinier
Actor behind Operation LagTime targets Russia
nccTrojan
2020-11-26Arch Cloud LabsArchCloud
Tracking Cryptocurrency Malware in The Homelab
2020-11-26SUCURILuke Leal
Hackers Love Expired Domains
2020-11-25UptycsAbhijit Mohanta, Shilpesh Trivedi
Warzone RAT comes with UAC bypass technique
Ave Maria
2020-11-25AvananMichael Landewe
Microsoft Teams: New Attack Form Almost Takes Down Global Financial Institution
2020-11-24Congressional Research ServiceCongressional Research Service
Russian Military Intelligence: Background and Issues for Congress
2020-11-24360 netlabJiaYu
Blackrota, a heavily obfuscated backdoor written in Go
Blackrota
2020-11-24IntezerAvigayil Mechtinger
Stantinko’s Proxy After Your Apache Server
Stantinko
2020-11-23Youtube (OWASP DevSlop)Negar Shabab, Noushin Shabab
Compromised Compilers - A new perspective of supply chain cyber attacks
ShadowPad
2020-11-22FireEyeYihao Lim
Election Cyber Threats in the Asia-Pacific Region
2020-11-22Irshad's BlogIrshad Muhammad
Analyzing an Emotet Dropper and Writing a Python Script to Statically Unpack Payload.
Emotet
2020-11-20360kate
360 File-less Attack Protection Intercepts the Banker Trojan BBtok Active in Mexico
BBtok