Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-18PRODAFT Threat IntelligencePRODAFT
Wizard Spider In-Depth Analysis
Cobalt Strike Conti WIZARD SPIDER
2022-05-18Trend MicroBuddy Tancio, Jed Valderama
Uncovering a Kingminer Botnet Attack Using Trend Micro™ Managed XDR
Kingminer
2022-05-18Cado SecurityMatt Muir
Linux Attack Techniques: Dynamic Linker Hijacking with LD Preload
2022-05-18ntopntop
How ntopng monitors IEC 60870-5-104 traffic
INDUSTROYER2
2022-05-18Weixin360 Threat Intelligence Center
filesyncshell.dll hijacked? APT-C-24 Sidewinder Briefing on the Latest Attack Activity
2022-05-18Cisco TalosHolger Unterbrink
The BlackByte ransomware group is striking users all over the globe
BlackByte
2022-05-18eSentireeSentire Threat Response Unit (TRU)
eSentire Threat Intelligence Malware Analysis: Mars Stealer
Mars Stealer
2022-05-17ElasticAlex Bell, Colson Wilhoit, Jake King, Rhys Rustad-Elliott
A peek behind the BPFDoor
BPFDoor
2022-05-17SekoiaQuentin Bourgue, Threat & Detection Research Team
EternityTeam: a new prominent threat group on underground forums
Eternity Stealer
2022-05-17Palo Alto Networks Unit 42Brad Duncan
Emotet Summary: November 2021 Through January 2022
Emotet
2022-05-17Microsoft SecurityBerman Enconado, Laurie Kirk
In hot pursuit of ‘cryware’: Defending hot wallets from attacks
Mars Stealer RedLine Stealer
2022-05-17Trend MicroTrend Micro Research
Ransomware Spotlight: RansomEXX
LaZagne Cobalt Strike IcedID MimiKatz PyXie RansomEXX TrickBot
2022-05-17Positive TechnologiesPositive Technologies
Space Pirates: analyzing the tools and connections of a new hacker group
FormerFirstRAT PlugX Poison Ivy Rovnix ShadowPad Zupdax
2022-05-17Advanced IntelligenceVitali Kremez, Yelisey Boguslavskiy
Hydra with Three Heads: BlackByte & The Future of Ransomware Subsidiary Groups
BlackByte Conti
2022-05-17FortinetGergely Revay, Shunichi Imano
Chaos Ransomware Variant Sides with Russia
Chaos
2022-05-17SUCURIDenis Sinegubko
X-Cart Skimmer with DOM-based Obfuscation
2022-05-16cocomelonccocomelonc
Malware development: persistence - part 6. Windows netsh helper DLL. Simple C++ example.
CherryPicker POS Ramsay
2022-05-16Github (MythicAgents)MythicAgents
Apollo on Github
Apollo
2022-05-16Department of Justice
Hacker and Ransomware Designer Charged for Use and Sale of Ransomware, and Profit Sharing Arrangements with Cybercriminals (APPLICATION FOR AN ARREST WARRANT)
Hakbit
2022-05-16RiskIQRiskIQ
RiskIQ: Storm Clauds - New C2 Over DNS Mimics CloudFront
Mirai