Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-05Kashif Ali Surfeit and Blasé SecurityKashif Ali
Roaming Mantis Amplifies Smishing Campaign with OS-Specific Android Malware
MoqHao Roaming Mantis
2021-05-05ProferoProfero, SecurityJoes
Cuba Ransomware Group on a Roll
Cuba
2021-05-04in.securityOwen
Detecting Lateral Movement via WinRM Using KQL
2021-05-03Rewterz Information SecurityRewterz Information Security
Rewterz Threat Alert – Financially Motivated Aggressive Group Carrying Out Ransomware Campaigns – Active IOCs
FiveHands SombRAT UNC2447
2021-04-29SecurityWeekIonut Arghire
Chinese Cyberspies Target Military Organizations in Asia With New Malware
Nebulae
2021-04-29The Institute for Security and TechnologyThe Institute for Security and Technology
Combating Ransomware A Comprehensive Framework for Action: Key Recommendations from the Ransomware Task Force
Conti EternalPetya
2021-04-26CISACISA, Department of Homeland Security, FBI
Russian Foreign Intelligence Service (SVR)Cyber Operations: Trends and Best Practices for Network Defenders
elf.wellmess WellMess
2021-04-25Nightwatch CybersecurityNightwatch Cybersecurity
Supply Chain Attacks via GitHub.com Releases
2021-04-24Non-offensive securityNon-offensive security team
Detect Cobalt Strike server through DNS protocol
Cobalt Strike
2021-04-23GuidePoint SecurityDrew Schmitt
Mount Locker Ransomware Steps up Counter-IR Capabilities, Hindering Efforts for Detection, Response and Investigation
Mount Locker
2021-04-22The RecordCatalin Cimpanu
Nightmare week for security vendors: Now a Trend Micro bug is being exploited in the wild
2021-04-20FireEyeAlex Pennino, Chris DiGiamo, Josh Fleischer
Zero-Day Exploits in SonicWall Email Security Lead to Enterprise Compromise
2021-04-16Medium (Bank Security)Bank_Security
Are the hackers all Russian? Results of a 1 year espionage operation in the Top-tier Russian underground communities
2021-04-13CAPCOMCAPCOM
4th Update Regarding Data Security Incident Due to Unauthorized Access:Investigation Results
RagnarLocker
2021-04-12PTSecurityPTSecurity
PaaS, or how hackers evade antivirus software
Amadey Bunitu Cerber Dridex ISFB KPOT Stealer Mailto Nemty Phobos Pony Predator The Thief QakBot Raccoon RTM SmokeLoader Zloader
2021-04-06Cado Securitycadolabs
Threat Group Uses Voice Changing Software in Espionage Attempt
Houdini
2021-04-02360 Total Securitykate
A “txt file” can steal all your secrets
Poulight Stealer
2021-04-01humansecurityAdam Sell, Federico Harrington, Gabi Cirlig, Inna Vasilyeva, Michael McNally, Michael Moran, Mikhail Venkov, Vikas Parthasarathy
PARETO: A Technical Analysis
2021-03-31GoogleAdam Weidemann, Google Threat Analysis Group
Update on campaign targeting security researchers
2021-03-31Twitter (@ClearskySec)ClearSky Cyber Security
Tweet on Adamantium stealer
Adamantium Thief