Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-23BlackberryBlackBerry Research and Intelligence team
PYSA Loves ChaChi: a New GoLang RAT
ChaChi Mespinoza
2021-06-22LumenBlack Lotus Labs
Suspected Pakistani Actor Compromises Indian Power Company with New ReverseRat
ReverseRAT
2021-06-21RAND CorporationDerek Grossman, Kristen Gunness, Marigold Black, Michael S. Chase, Natalia D. Simmons-Thomas, Nathan Beauchamp-Mustafaga
Deciphering Chinese Deterrence Signalling in the New Era An Analytic Framework and Seven Case Studies
2021-06-21laceworkTom Hegel
Threat Hunting SSH Keys – Bash Script Feature Pivoting
2021-06-17KasperskyMarc Rivero López
Black Kingdom ransomware
BlackKingdom Ransomware
2021-06-16ProofpointDaniel Blackford, Garrett M. Graff, Selena Larson
The First Step: Initial Access Leads to Ransomware
BazarBackdoor Egregor IcedID Maze QakBot REvil Ryuk TrickBot WastedLocker TA570 TA575 TA577
2021-06-11Quick HealDigvijay Mane
Google Play store applications laced with Joker malware yet again
Joker
2021-06-10laceworkChris Hall
Keksec & Tsunami-Ryuk
N3Cr0m0rPh
2021-06-03cyblecybleinc
Deep Dive into BlackCocaine Ransomware
Epsilon Red
2021-05-25laceworkLacework Labs
Taking TeamTNT’s Docker Images Offline
2021-05-21LACYoshihiro Ishikawa
Targeted attack by 'Cobalt Strike loader' that exploits Microsoft's digital signature-Attacker group APT41
Cobalt Strike DUSTPAN
2021-05-21blackarrowPablo Ambite
Leveraging Microsoft Teams to persist and cover up Cobalt Strike traffic
Cobalt Strike
2021-05-20laceworkChris Hall, Jared Stroud, Tom Hegel
8220 Gangs Recent use of Custom Miner and Botnet
2021-05-18BlackberryBlackBerry Threat Research and Intelligence Team
Strong ARMing with MacOS: Adventures in Cross-Platform Emulation
2021-05-18Digital ShadowsPhoton Research Team
Examining Russian-language Cybercriminal Marketplaces
2021-05-13BlackberryBlackBerry Threat Research and Intelligence Team
Threat Thursday: SombRAT — Always Leave Yourself a Backdoor
SombRAT
2021-05-12NortonLifeLockDaniel Kats, David Zhuang
Encrypted Chat Apps Doubling as Illegal Marketplaces
2021-05-07Bleeping ComputerLawrence Abrams
Data leak marketplaces aim to take over the extortion economy
Babuk Maze
2021-05-06Black HatAnurag Khanna, Thirumalai Natarajan Muthiah
Threat Hunting in Active Directory Environment
2021-05-06Black HatChristian Doerr, Tsuyoshi Taniguchi
How Did the Adversaries Abusing Bitcoin Blockchain Evade Our Takeover
Cerber Pony