Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-12-29Blake's R&DBlake
Cobalt Strike DFIR: Listening to the Pipes
Cobalt Strike
2021-12-29Nikkei AsiaRyoma Kashiwagi
Japan aerospace cyberattacks show link to Chinese military: police (PLA Unit 61419)
2021-12-28AhnLabASEC Analysis Team
APT Attack Cases of Kimsuky Group (PebbleDash)
PEBBLEDASH
2021-12-28Twitter (MalwareHunterTeam)MalwareHunterTeam
Tweet on RagnarLocker Linux variant
RagnarLocker
2021-12-28CyStackChau Ha, Chau Nguyen, Duong Tran, Khoi Vu, Son Nguyen, Trung Nguyen
The attack on ONUS – A real-life case of the Log4Shell vulnerability
2021-12-28AhnLabASEC Analysis Team
Cases of Lockis ransomware infection
GlobeImposter
2021-12-28CrowdStrikeBlair Foster, satoshi tanda, Timo Kreuzer, Yarden Shafir
CrowdStrike Strengthens Exploit Protection Using Intel CPU Telemetry
2021-12-28Morphus LabsRenato Marinho
Attackers are abusing MSBuild to evade defenses and implant Cobalt Strike beacons
Cobalt Strike
2021-12-28MIT Technology ReviewPatrick Howell O'Neill
The hacker-for-hire industry is now too big to fail
2021-12-28The RecordCatalin Cimpanu
Iranian hackers behind Cox Media Group ransomware attack (DEV-0270)
SamSam
2021-12-28NTTHiroki Hada
Flagpro: The new malware used by BlackTech
Flagpro
2021-12-27Checkpoint Research
A Deep Dive into DoubleFeature, Equation Group’s Post-Exploitation Dashboard
Equationgroup (Sorting) Fanny MISTYVEAL PeddleCheap
2021-12-23thinkbig blogAaron Jornet
Snip3, an investigation into malware
2021-12-23SymantecSiddhesh Chandrayan
Log4j Vulnerabilities: Attack Insights
Tsunami Conti Dridex Khonsari Orcus RAT TellYouThePass
2021-12-23SentinelOneJim Walter
New Rook Ransomware Feeds Off the Code of Babuk
Rook
2021-12-23newswiresPaul Mills
Hacker gains access to Hewlett-Packard 9000 EPYC server hardware to mine the cryptocurrency Raptoreum using Java exploit
2021-12-22Aqua NautilusAssaf Morag
Stopping a DreamBus Botnet Attack with Aqua’s CNDR
DreamBus Kinsing
2021-12-22ThreatrayMarkel Picado Ortiz
Establishing the TigerRAT and TigerDownloader Malware Families
TigerLite Tiger RAT
2021-12-22CloudsekAnandeshwar Unnikrishnan
Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan
Emotet
2021-12-22CrowdStrikeIan Barton, Randy Burton
CrowdStrike Launches Free Targeted Log4j Search Tool