Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-03Stratosphere LabKamila Babayeva, Sebastian García
Dissecting a RAT. Analysis of DroidJack v4.4 RAT network traffic.
DroidJack
2021-02-02MalwarebytesJérôme Segura
Credit card skimmer piggybacks on Magento 1 hacking spree
2021-02-02The Wall Street JournalRobert McMillan
Hackers Lurked in SolarWinds Email System for at Least 9 Months, CEO Says
2021-02-02ReutersChristopher Bing, Jack Stubbs, Joseph Menn, Raphael Satter
Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on U.S. payroll agency - sources
2021-02-02ReutersChristopher Bing, Jack Stubbs, Joseph Menn, Raphael Satter
Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on U.S. payroll agency - sources
2021-02-02ReutersChristopher Bing, Jack Stubbs, Joseph Menn, Raphael Satter
Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on U.S. payroll agency - sources
2021-02-02ReutersChristopher Bing, Jack Stubbs, Joseph Menn, Raphael Satter
Exclusive: Suspected Chinese hackers used SolarWinds bug to spy on U.S. payroll agency - sources
2021-02-02Twitter (@TheDFIRReport)The DFIR Report
Tweet on recent dridex post infection activity
Cobalt Strike Dridex
2021-02-02Committee to Protect JournalistsMadeline Earp
How Vietnam-based hacking operation OceanLotus targets journalists
Cobalt Strike
2021-02-02SUCURIDenis Sinegubko
Whitespace Steganography Conceals Web Shell in PHP Malware
2021-02-02ESET ResearchIgnacio Sanmillan, Marc-Etienne M.Léveillé
Kobalos – A complex Linux threat to high performance computing infrastructure
Kobalos
2021-02-01Silent PushMartijn Grooten
Pivoting: finding malware domains without seeing malicious activity
Hancitor
2021-02-01Massachusetts GovernmentMassachusetts Government
Cybersecurity Advisory for Public Water Suppliers
2021-02-01Dancho Danchev's BlogDancho Danchev's Blog
Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Two
2021-02-01ESET ResearchIgnacio Sanmillan, Matthieu Faou
Operation NightScout: Supply‑chain attack targets online gaming in Asia
Ghost RAT NoxPlayer Poison Ivy Red Dev 17
2021-02-01ESET ResearchIgnacio Sanmillan, Matthieu Faou
Operation NightScout: Supply‑chain attack targets online gaming in Asia
Ghost RAT NoxPlayer Poison Ivy Red Dev 17
2021-02-01AhnLabASEC Analysis Team
BlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment
Cobalt Strike REvil
2021-02-01Twitter (@IntelAdvanced)Advanced Intelligence
Tweet on Active Directory Exploitation by RYUK "one" group
Ryuk
2021-02-01pkb1s.github.ioPetros Koutroumpis
Relay Attacks via Cobalt Strike Beacons
Cobalt Strike
2021-02-01Microstep Intelligence BureauMicrostep online research response team
Analysis of the attack activity organized by Konni APT using the topic of North Korean epidemic materials as bait
Amadey