Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-04MandiantBrendan McKeague, Bryce Abdo, Ioana Teaca, Zander Work
FIN7 Power Hour: Adversary Archaeology and the Evolution of FIN7
Griffon BABYMETAL Carbanak Cobalt Strike JSSLoader Termite
2022-04-04CloudsekAnirudh Batra
Detailed Analysis of LAPSUS$ Cybercriminal Group that has Compromised Nvidia, Microsoft, Okta, and Globant
2022-04-04Cert-UACert-UA
Cyber ​​attack of UAC-0010 group (Armageddon) on state organizations of Ukraine (CERT-UA # 4378)
Gamaredon Group
2022-04-04LAC WATCHTakehiko Takagen
Confirmation of damage to domestic e-commerce sites, actual situation of Web skimming attacks and examples of countermeasures that Rack thinks (Water Pamola)
FAKEUPDATES
2022-04-04Trend MicroTrend Micro Research
Ransomware Spotlight: AvosLocker
AvosLocker
2022-04-04DragosDragos
European Industrial Infrastructure Cyber Threat Perspective
2022-04-04IntezerJoakim Kennedy, Nicole Fishbein
Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations
GraphSteel GrimPlant SaintBear
2022-04-04Medium (csg-govtech)Max Chee
Uncommon office malware stagers
2022-04-04Bankinfo SecurityJeremy Kirk
The Ransomware Files, Episode 6: Kaseya and REvil
REvil
2022-04-04Cyber Security NewsGurubaran
AcidRain Wiper Malware hit Routers and Modems, Haults Communication
AcidRain
2022-04-04The Hacker NewsRavie Lakshmanan
Experts Shed Light on BlackGuard Infostealer Malware Sold on Russian Hacking Forums
BlackGuard
2022-04-04Bill Demirkapi's BlogBill Demirkapi
Sharing is Caring: Abusing Shared Sections for Code Injection
2022-04-04KasperskyAMR
Spring4Shell (CVE-2022-22965): details and mitigations
2022-04-04The DFIR Report@0xtornado, @MettalicHack, @yatinwad, @_pete_0
Stolen Images Campaign Ends in Conti Ransomware
Conti IcedID
2022-04-03YouTube (0xca7)0xca7
Powershell Script Deobfuscation
2022-04-03Bleeping ComputerBill Toulas
New Borat remote access malware is no laughing matter
Borat RAT
2022-04-02Dr.WebDr.Web
Study of targeted attacks on Russian research institutes
Logtu
2022-04-02Github (pl-v)Player-V
Emotet Analysis Part 1: Unpacking
Emotet
2022-04-02Github (cocomelonc)cocomelonc
Malware development tricks. Find kernel32.dll base: asm style. C++ example.
Conti
2022-04-02GovInfo SecurityPrajeet Nair
Cyber Espionage Actor Deploying Malware Using Excel
GraphSteel GrimPlant