Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-23TrellixChristiaan Beek
The Sound of Malware
Conti VHD Ransomware
2022-06-21Cisco TalosChris Neal, Flavio Costa, Guilherme Venere
Avos ransomware group expands with new attack arsenal
AvosLocker Cobalt Strike DarkComet MimiKatz
2022-06-07Lacework LabsChris Hall
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134
Dark Kinsing
2022-05-25ReutersChristopher Bing, James Pearson, Raphael Satter
Russian hackers are linked to new Brexit leak website, Google says
2022-05-19Trend MicroAdolph Christian Silverio, Jeric Miguel Abordo, Khristian Joseph Morales, Maria Emreen Viray
Bruised but Not Broken: The Resurgence of the Emotet Botnet Malware
Emotet QakBot
2022-05-19GoogleChristian Resell, Clement Lecigne, Google Threat Analysis Group
Protecting Android users from 0-Day attacks
2022-05-12Lacework LabsChris Hall, Jared Stroud
Malware targeting latest F5 vulnerability
Mirai
2022-05-06Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: CS Metadata Encoding and Decoding
Cobalt Strike
2022-05-05BrightTALK (Mandiant)Christopher Gardner
The Sample: Beating the Malware Piñata
Jaku
2022-05-05YouTube (Chris Greer)Chris Greer
MALWARE Analysis with Wireshark // TRICKBOT Infection
TrickBot
2022-05-03TrellixChristiaan Beek
The Hermit Kingdom’s Ransomware play
VHD Ransomware
2022-05-02Trend MicroAlvin Nieto, Christoper Ordonez
AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell
AvosLocker
2022-05-02MandiantChris Gardner, Doug Bienstock, Josh Madeley, Melissa Derr, Tyler McLellan
UNC3524: Eye Spy on Your Email
QUIETEXIT UNC3524
2022-04-25MandiantChris Sistrunk, Corey Hildebrandt, Daniel Kapellmann Zafra, Keith Lunden, Ken Proska, Nathan Brubaker, Raymond Leong
INDUSTROYER.V2: Old Malware Learns New Tricks
INDUSTROYER2
2022-04-06Cado SecurityAl Carchrie, Chris Doman, Matt Muir, Paul Scott
Cado Discovers Denonia: The First Malware Specifically Targeting Lambda
Denonia
2022-03-31LunasecChris Thompson, Forrest Allison, Free Wortley
Spring4Shell: Security Analysis of the latest Java RCE '0-day' vulnerabilities in Spring
2022-03-31CrowdStrikeChristopher Romano, Vaishnav Murthy
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365
2022-03-16paloalto Netoworks: Unit42Andrew Guan, Chris Navarrete, Durgesh Sangvikar, Siddhart Shibiraj, Yanhui Jia, Yu Fu
Cobalt Strike Analysis and Tutorial: How Malleable C2 Profiles Make Cobalt Strike Difficult to Detect
Cobalt Strike
2022-03-15SecurityIntelligenceChristopher Del Fierro, John Dwyer
CaddyWiper: Third Wiper Malware Targeting Ukrainian Organizations
CaddyWiper
2022-03-10Cisco TalosChris Neal
WEDNESDAY, MARCH 9, 2022 Threat advisory: Cybercriminals compromise users with malware disguised as pro-Ukraine cyber tools