Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-11-23Stranded on Pylos BlogJoe Slowik
Detailing Daily Domain Hunting
2022-10-12SentinelOneAmitai Ben Shushan Ehrlich, Joey Chen
WIP19 Espionage | New Chinese APT Targets IT Service Providers and Telcos With Signed Malware
Maggie ScreenCap WIP19
2022-09-29ReutersBozorgmehr Sharafedin, Joel Schectman
America’s Throwaway Spies How the CIA failed Iranian informants in its secret war with Tehran
2022-09-14Security JoesFelipe Duarte
Dissecting PlugX to Extract Its Crown Jewels
PlugX
2022-08-18ProofpointJoe Wise, Proofpoint Threat Research Team, Selena Larson
Reservations Requested: TA558 Targets Hospitality and Travel
AsyncRAT Loda NjRAT Ozone RAT Revenge RAT Vjw0rm
2022-08-050xIvanTwitter (@viljoenivan)
LokiBot Analysis
Loki Password Stealer (PWS)
2022-08-04YouTube (Security Joes)Felipe Duarte, Ido Naor
Sockbot In Goland - Linking APT Actors With Ransomware Gangs
Sockbot
2022-07-20Trend MicroBuddy Tancio, Erika Mendoza, Jessie Prevost, Joelson Soares, Nusrath Iqra
Analyzing Penetration-Testing Tools That Threat Actors Use to Breach Systems and Steal Data
2022-07-18YouTube (Security Joes)Felipe Duarte
PlugX DLL Side-Loading Technique
PlugX
2022-07-11BBCJoe Tidy
Predatory Sparrow: Who are the hackers who say they started a fire in Iran?
Predatory Sparrow
2022-06-15Security JoesCharles Lomboni, Felipe Duarte, Venkat Rajgor
Backdoor via XFF: Mysterious Threat Actor Under Radar
CHINACHOPPER
2022-06-09Sentinel LABSJoey Chen
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
heyoka mongall Aoqin Dragon
2022-05-08IronNetBrent Eskridge, Joey Fitzpatrick, Michael Leardi
Tracking Cobalt Strike Servers Used in Cyberattacks on Ukraine
Cobalt Strike
2022-05-02Sentinel LABSAmitai Ben Shushan Ehrlich, Joey Chen
Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad
PlugX ShadowPad Moshen Dragon
2022-04-23Stranded on Pylos BlogJoe Slowik
Industroyer2 in Perspective
INDUSTROYER2
2022-04-08Secure RoboticsJoel Yonts
Securing Chatbot Technology - Part1: Chatbot Weaponization And ChatRATS
2022-03-09Security JoesFelipe Duarte, Ido Naor
Sockbot in GoLand
lsassDumper Sockbot
2022-03-07ElasticAndrew Pease, Cyril François, Daniel Stepanic, Derek Ditch, Github (@1337-42), Joe Desimone, Samir Bousseaden
PHOREAL Malware Targets the Southeast Asian Financial Sector
PHOREAL
2022-02-25CyberScoopJoe Warminsky
TrickBot malware suddenly got quiet, researchers say, but it's hardly the end for its operators
BazarBackdoor Emotet TrickBot
2022-02-18ReutersChristopher Bing, Joel Schectman
How a Saudi woman's iPhone revealed hacking around the world
Chrysaor