Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-03-02TechCrunchKirsten Korosec, Zack Whittaker
Visser, a parts manufacturer for Tesla and SpaceX, confirms data breach
DoppelPaymer
2020-03-02TelsyTelsy
APT34 (aka OilRig, aka Helix Kitten) attacks Lebanon government entities with MailDropper implants
Karkoff
2020-03-02Qihoo 360 TechnologyQihoo 360
The CIA Hacking Group (APT-C-39) Conducts Cyber-Espionage Operation on China's Critical Industries for 11 Years
Longhorn
2020-03-02Virus BulletinAlex Hinchliffe
Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary
HenBox Farseer PlugX Poison Ivy
2020-03-01Dr.WebDr.Web
BackDoor.Spyder.1
Spyder
2020-02-28Financial Security InstituteFinancial Security Institute
Profiling of TA505 Threat Group That Continues to Attack the Financial Sector
Amadey Clop FlawedAmmyy Rapid Ransom SDBbot TinyMet
2020-02-26MetaSwan's LabMetaSwan
Lazarus group's Brambul worm of the former Wannacry - 2
Brambul
2020-02-26MetaSwan's LabMetaSwan
Lazarus group's Brambul worm of the former Wannacry - 1
Brambul WannaCryptor
2020-02-26Bleeping ComputerLawrence Abrams
Sodinokibi Ransomware May Tip NASDAQ on Attacks to Hurt Stock Prices
REvil
2020-02-26MalwareLab.plMaciej Kotowicz
(Ab)using bash-fu to analyze recent Aggah sample
Agent Tesla
2020-02-25ID RansomwareAndrew Ivanov
BlackKingdom Ransomware
BlackKingdom Ransomware
2020-02-25SentinelOneJim Walter
DPRK Hidden Cobra Update: North Korean Malicious Cyber Activity
ARTFULPIE BISTROMATH BUFFETLINE CHEESETRAY HOPLIGHT HOTCROISSANT SLICKSHOES
2020-02-24CyberArkBen Cohen
Analyzing the Raccoon Stealer
Raccoon
2020-02-24DragosDragos
2019 Year In Review: The ICS Landscape and Threat Actviity Groups
Fox Kitten
2020-02-24Sophos LabsSergei Shevchenko
Cloud Snooper attack bypasses firewall security measures
Cloud Snooper
2020-02-22ComaeMatt Suiche
Active Email Campaign Identified With Malicious Excel Files
2020-02-20McAfeeChristiaan Beek, Darren Fitzpatrick, Eamonn Ryan
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
Cobalt Strike LockerGoga Maze MegaCortex
2020-02-20NCSC UKNCSC UK
UK condemns Russia's GRU over Georgia cyber-attacks
2020-02-20ZDNetCatalin Cimpanu
Croatia's largest petrol station chain impacted by cyber-attack
Clop
2020-02-20Carbon BlackTakahiro Haruyama
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part2 (Winnti 4.0)
Winnti