Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-05-26DataBreaches.netDissent
A former DarkSide listing shows up on REvil’s leak site
DarkSide REvil
2020-05-26EpicTurlaJuan Andrés Guerrero-Saade
ACIDBOX Clustering
AcidBox
2020-05-24Palo Alto Networks Unit 42Ajaya Neupane, Stefan Achleitner
Using AI to Detect Malicious C2 Traffic
Emotet Sality
2020-05-23360 netlabJinye
New activity of DoubleGuns Group, control hundreds of thousands of bots via public cloud service
2020-05-23Australian Cyber Security CentreAustralian Cyber Security Centre (ACSC)
Summary of Tradecraft Trends for 2019-20: Tactics, Techniques and Procedures Used to Target Australian Networks
2020-05-22YoroiAntonio Pirozzi, Giacomo d'Onofrio, Luca Mella, Luigi Martire
Cyber-Criminal espionage Operation insists on Italian Manufacturing
Agent Tesla
2020-05-22Positive TechnologiesPT ESC Threat Intelligence
Operation TA505: investigating the ServHelper backdoor with NetSupport RAT. Part 2.
NetSupportManager RAT ServHelper
2020-05-21SophosSophosLabs Uncut
Asnarök attackers twice modified attack midstream
NOTROBIN Ragnarok
2020-05-21MalwarebytesMalwarebytes Labs
Cybercrime tactics and techniques
Ave Maria Azorult DanaBot Loki Password Stealer (PWS) NetWire RC
2020-05-21SophosSophosLabs Uncut
Ragnar Locker ransomware deploys virtual machine to dodge security
RagnarLocker
2020-05-21VMWare Carbon BlackJared Myers
TAU Technical Report: New Attack Combines TinyPOS With Living-off-the-Land Techniques for Scraping Credit Card Data
AbaddonPOS
2020-05-21Trend MicroLlallum Victoria, Raphael Centeno
Backdoor, Devil Shadow Botnet Hidden in Fake Zoom Installers
2020-05-19zero2autoVitali Kremez
Netwalker Ransomware - From Static Reverse Engineering to Automatic Extraction
Mailto
2020-05-19HornetsecuritySecurity Lab
Information Stealer Campaign Targeting German HR Contacts
LALALA Stealer
2020-05-19SymantecCritical Attack Discovery and Intelligence Team
Sophisticated Espionage Group Turns Attention to Telecom Providers in South Asia
ISMAgent ISMDoor
2020-05-19Cisco TalosPaul Rascagnères, Vitor Ventura, Warren Mercer
The wolf is back...
WolfRAT
2020-05-18ZDNetCatalin Cimpanu
FBI: ProLock ransomware gains access to victim networks via Qakbot infections
PwndLocker
2020-05-18One Night in NorfolkKevin Perlow
Looking Back at LiteDuke
LiteDuke
2020-05-17CrowdStrikesatoshi tanda
CrowdStrike Falcon Detects Kernel Attacks Exploiting Vulnerable Dell Driver (CVE-2021-21551)
2020-05-16atdotdeRobert Helling
High Performance Hackers
Loerbas