Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19Trend MicroAliakbar Zahravi, Cedric Pernet, Daniel Lunghi, Eliot Cao, Jaromír Hořejší, John Zhang, Joseph C. Chen, Nelson William Gamazo Sanchez
Operation Earth Kitsune: Tracking SLUB’s Current Operations
SLUB
2020-10-19FBIFBI
GRU HACKERS' DESTRUCTIVE MALWARE AND INTERNATIONAL CYBER ATTACKS
2020-10-19CyberScoopTim Starks
US charges Russian GRU officers for NotPetya, other major hacks
EternalPetya
2020-10-16AlyacAlyac
탈륨조직의 국내 암호화폐 지갑 펌웨어로 위장한 다차원 APT 공격 분석출처 ( THALLIUM)
2020-10-16GoogleGoogle Threat Analysis Group, Shane Huntley
How we're tackling evolving online threats
2020-10-16GoogleGoogle Threat Analysis Group, Shane Huntley
How we're tackling evolving online threats
2020-10-16Medium DoublepulsarKevin Beaumont
Second Zerologon attacker seen exploiting internet honeypot
RemCom
2020-10-16CrowdStrikeThe Crowdstrike Intel Team
WIZARD SPIDER Update: Resilient, Reactive and Resolute
BazarBackdoor Conti Ryuk TrickBot
2020-10-15laceworkChris Hall
Moobot's Cloud Migration
2020-10-15ClearSkyClearSky
Operation Quicksand: MuddyWater’s Offensive Attack Against Israeli Organizations
PowGoop Covicli
2020-10-15Intel 471Intel 471
That was quick: Trickbot is back after disruption attempts
TrickBot
2020-10-14FBIFBI
FBI FLASH MU-000136-MW: Cyber ActorsTarget Misconfigured SonarQube Instances to Access Proprietary Source Code of US Government Agencies and Businesses
2020-10-14FireEyeAndrew Moore, Genevieve Stark, Jacqueline O’Leary, Kimberly Goody, Nalani Fraser, Vincent Cannon
FIN11: Widespread Email Campaigns as Precursor for Ransomware and Data Theft
FIN11
2020-10-14Medium CyCraftCyCraft Technology Corp
Taiwan Government Targeted by Multiple Cyberattacks in April 2020 Part 2: Owlproxy Malware
Owlproxy