Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-16KasperskyGReAT
Ferocious Kitten: 6 years of covert surveillance in Iran
MarkiRAT Ferocious Kitten
2021-06-16RiskIQJordan Herman
Bit2Check: Investigating Actors in the Carding Space
2021-06-16The RecordCatalin Cimpanu
Ukrainian police arrest Clop ransomware members, seize server infrastructure
Clop
2021-06-15Silent PushSilent Push
Infra-Tagging -a new tool in Cyber Threat Intelligence
2021-06-15PARAFLAREDaniel Eden
A Defender's Perspective of SSL VPN Exploitation
2021-06-15Perception PointShai Golderman
Insights Into an Excel 4.0 Macro Attack using Qakbot Malware
QakBot
2021-06-15The RecordCatalin Cimpanu
Source code for Paradise ransomware leaked on hacking forums
Paradise
2021-06-15ICRCICRC
Avoiding Civilian Harm from Military Cyber Operations during Armed Conflicts
2021-06-15TenableDerek Melber
How to Protect Active Directory Against Ransomware Attacks
2021-06-15360 Threat Intelligence Center360 Fiberhome Laboratory
PJobRAT: Spyware targeting Indian military personnel
PjobRAT
2021-06-15Nextron SystemsNextron Systems
Use YARA math Module Extension in THOR TechPreview and THOR Lite
2021-06-15ElasticGabriel Landau
What you need to know about Process Ghosting, a new executable image tampering attack
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades
2021-06-15NCC GroupMichael Matthews, NCC RIFT, William Backhouse
Handy guide to a new Fivehands ransomware variant
FiveHands
2021-06-14scotthelme.co.ukScott Helme
Introducing Script Watch: Detect Magecart style attacks, fast!
magecart
2021-06-14The RecordCatalin Cimpanu
G7 calls on Russia to crack down on ransomware gangs
2021-06-14nccgroupFox-IT Data Science Team, NCCGroup
Incremental Machine Learning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
2021-06-14nccgroupFox-IT Data Science Team, NCCGroup
Incremental Machine Learning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
2021-06-14MicrosoftMicrosoft 365 Defender Research Team, Microsoft Threat Intelligence Center (MSTIC)
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
2021-06-14MicrosoftMicrosoft 365 Defender Research Team, Microsoft Threat Intelligence Center (MSTIC)
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign