Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-01Silent PushMartijn Grooten
Pivoting: finding malware domains without seeing malicious activity
Hancitor
2021-02-01Massachusetts GovernmentMassachusetts Government
Cybersecurity Advisory for Public Water Suppliers
2021-02-01Dancho Danchev's BlogDancho Danchev's Blog
Profiling a Currently Active High-Profile Cybercriminals Portfolio of Ransomware-Themed Extortion Email Addresses - Part Two
2021-02-01ESET ResearchIgnacio Sanmillan, Matthieu Faou
Operation NightScout: Supply‑chain attack targets online gaming in Asia
Ghost RAT NoxPlayer Poison Ivy Red Dev 17
2021-02-01ESET ResearchIgnacio Sanmillan, Matthieu Faou
Operation NightScout: Supply‑chain attack targets online gaming in Asia
Ghost RAT NoxPlayer Poison Ivy Red Dev 17
2021-02-01AhnLabASEC Analysis Team
BlueCrab ransomware, CobaltStrike hacking tool installed in corporate environment
Cobalt Strike REvil
2021-02-01Twitter (@IntelAdvanced)Advanced Intelligence
Tweet on Active Directory Exploitation by RYUK "one" group
Ryuk
2021-02-01pkb1s.github.ioPetros Koutroumpis
Relay Attacks via Cobalt Strike Beacons
Cobalt Strike
2021-02-01Microstep Intelligence BureauMicrostep online research response team
Analysis of the attack activity organized by Konni APT using the topic of North Korean epidemic materials as bait
Amadey
2021-02-01MicrosoftMicrosoft 365 Defender Threat Intelligence Team
What tracking an attacker email infrastructure tells us about persistent cybercriminal operations
Dridex Emotet Makop Ransomware SmokeLoader TrickBot
2021-02-01EST SecurityAlyac
Thallium organization conducts elaborate cyber attack against Russian researchers working in the North Korean economyPerforming sophisticated cyber attacks against researchers
2021-02-01Medium 0xthreatintel0xthreatintel
Uncovering APT-C-41 (StrongPity) Backdoor
StrongPity
2021-01-31KELAVictoria Kivilevich
$1 Million is Just the Beginning: Q4 2020 in Network Access Sales
2021-01-30Microstep Intelligence BureauMicrostep online research response team
Analysis of Lazarus attacks against security researchers
ComeBacker
2021-01-29AonAlex Parsons, Carly Battaile, Partha Alwar
Cloudy with a Chance of Persistent Email Access
SUNBURST
2021-01-29AonAlex Parsons, Carly Battaile, Partha Alwar
Cloudy with a Chance of Persistent Email Access
SUNBURST
2021-01-29AonAlex Parsons, Carly Battaile, Partha Alwar
Cloudy with a Chance of Persistent Email Access
SUNBURST
2021-01-29Trend MicroTrend Micro
Chopper ASPX web shell used in targeted attack
CHINACHOPPER MimiKatz
2021-01-28Check PointLior Sonntag
Deep into the SunBurst Attack
SUNBURST
2021-01-28Huntress LabsJohn Hammond
Analyzing Ryuk Another Link in the Cyber Attack Chain
BazarBackdoor Ryuk