Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-11-25SentinelOneJim Walter
Egregor RaaS Continues the Chaos with Cobalt Strike and Rclone
Cobalt Strike Egregor
2020-11-18SentinelOneJim Walter
Ranzy Ransomware | Better Encryption Among New Features of ThunderX Derivative
ThunderX
2020-10-06SentinelOneJim Walter
The FONIX RaaS | New Low-Key Threat with Unnecessary Complexities
FONIX
2020-09-03SentinelOneJim Walter
Multi-Platform SMAUG RaaS Aims To See Off Competitors
SMAUG
2020-08-31SentinelOneJim Walter
The BLINDINGCAN RAT and Malicious North Korean Activity
BLINDINGCAN
2020-08-10SentinelOneJim Walter
Agent Tesla | Old RAT Uses New Tricks to Stay on Top
Agent Tesla
2020-07-23Sentinel LABSJim Walter
WastedLocker Ransomware: Abusing ADS and NTFS File Attributes
WastedLocker
2020-05-20SentinelOneJim Walter
Why On-Device Detection Matters: New Ramsay Trojan Targets Air-Gapped Networks
Ramsay
2020-05-04SentinelOneJim Walter
Meet NEMTY Successor, Nefilim/Nephilim Ransomware
Nefilim Nemty
2020-02-25SentinelOneJim Walter
DPRK Hidden Cobra Update: North Korean Malicious Cyber Activity
ARTFULPIE BISTROMATH BUFFETLINE CHEESETRAY HOPLIGHT HOTCROISSANT SLICKSHOES
2020-01-23SentinelOneJim Walter
New Snake Ransomware Adds Itself to the Increasing Collection of Golang Crimeware
Snake
2016-07-28BlackberryJim Walter
Petya and Mischa For All Part II: They’re Here…
Petya
2016-05-19BlackberryJim Walter
Petya and Mischa for All! The RaaS Boom Expands to Include the Petya/Mischa Combo
Petya
2016-05-04CylanceJim Walter
An Introduction to AlphaLocker
AlphaLocker
2016-03-29ThreatVectorJim Walter
Ransomware Update: Today’s Bountiful Cornucopia of Extortive Threats
PowerWare