Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-02Cisco TalosJAIME FILSON, Kendall McKay, Paul Eubanks
Conti and Hive ransomware operations: Leveraging victim chats for insights
Cobalt Strike Conti Hive
2022-05-02YouTube (S4 Events)Robert M. Lee
PIPEDREAM – Most Flexible & Capable ICS Malware To Date
2022-05-02Trend MicroAlvin Nieto, Christoper Ordonez
AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell
AvosLocker
2022-05-02Sentinel LABSAmitai Ben Shushan Ehrlich, Joey Chen
Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad
PlugX ShadowPad Moshen Dragon
2022-05-02AT&TFernando Martinez
Analysis on recent wiper attacks: examples and how wiper malware works
AcidRain CaddyWiper DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper
2022-05-02MacnicaHiroshi Takeuchi
Attack Campaigns that Exploit Shortcuts and ISO Files
Cobalt Strike
2022-05-02MandiantChris Gardner, Doug Bienstock, Josh Madeley, Melissa Derr, Tyler McLellan
UNC3524: Eye Spy on Your Email
QUIETEXIT UNC3524
2022-05-01Github (k-vitali)Vitali Kremez
REvil Reborn Ransom Config
REvil
2022-05-01BushidoTokenBushidoToken
Gamer Cheater Hacker Spy
Egregor HelloKitty NetfilterRootkit RagnarLocker Winnti
2022-05-01Bleeping ComputerLawrence Abrams
REvil ransomware returns: New malware sample confirms gang is back
REvil
2022-04-30CybereasonAssaf Dahan, Daniel Frank
PortDoor: New Chinese APT Backdoor Attack Targets Russian Defense Sector
PortDoor
2022-04-30Bleeping ComputerLawrence Abrams
Fake Windows 10 updates infect you with Magniber ransomware
Magniber
2022-04-29Team CymruJoshua Picolet
Sliver Case Study: Assessing Common Offensive Security Tools The Use of the Sliver C2 Framework for Malicious Purposes
Sliver
2022-04-29MandiantAnders Vejlby, John Wolfram, Nick Simonian, Sarah Hawley, Tyler McLellan
Trello From the Other Side: Tracking APT29 Phishing Campaigns
BEATDROP VaporRage
2022-04-29TrustwaveTrustwave SpiderLabs
Stormous: The Pro-Russian, Clout Hungry Ransomware Gang Targets the US and Ukraine
2022-04-29FortinetPaolo Di Prodi
Using EPSS to Predict Threats and Secure Your Network
2022-04-29FortinetAxelle Apvrille
Warning: GRIM and Magnus Android Botnets are Underground
2022-04-29Intel 471Souhail Hammou
Privateloader – The Malware Behind A Havoc-Wreaking Pay-Per-Install Service
PrivateLoader
2022-04-29AttackIQFrancis Guibernau, Jackson Wells
Attack Graph Response to UNC1151 Continued Targeting of Ukraine
MicroBackdoor
2022-04-29The RecordJonathan Greig
German wind farm operator confirms cybersecurity incident
Black Basta BlackCat

Select families...