Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-03-03SYGNIAAmitai Ben Shushan, Amnon Kushnir, Boaz Wasserman, Martin Korman, Noam Lifshitz
Lazarus Group’s MATA Framework Leveraged to Deploy TFlower Ransomware
Dacls Dacls Dacls TFlower
2021-03-03360 netlabAlex Turing, GenShen Ye
Fbot is now riding the traffic and transportation smart devices
FBot
2021-03-02MicrosoftTom Burt
New nation-state cyberattacks (HAFNIUM)
2021-03-02Metabase QJesus Dominguez, Ocelot Offensive Security Team
Ploutus is back, targeting Itautec ATMs in Latin America
Ploutus ATM
2021-03-02MicrosoftMSRC Team
Multiple Security Updates Released for Exchange Server – updated March 8, 2021
HAFNIUM
2021-03-02VolexityJosh Grunzweig, Matthew Meltzer, Sean Koessel, Steven Adair, Thomas Lancaster
Operation Exchange Marauder: Active Exploitation of Multiple Zero-Day Microsoft Exchange Vulnerabilities
CHINACHOPPER HAFNIUM
2021-03-02MicrosoftMicrosoft 365 Defender Threat Intelligence Team, Microsoft 365 Security, Microsoft Threat Intelligence Center (MSTIC)
HAFNIUM targeting Exchange Servers with 0-day exploits
CHINACHOPPER HAFNIUM
2021-03-02Cisco TalosAsheer Malhotra
ObliqueRAT returns with new campaign using hijacked websites
Oblique RAT
2021-03-02Atlantic CouncilJames Shires, JD Work, Luca Allodi, Patrick Howell O'Neill, Robert Morgus, Trey Herr, Winnona Desombre
Countering Cyber Proliferation: Zeroing in on Access-as-a-Service
2021-03-02MicrosoftMicrosoft Threat Intelligence Center (MSTIC)
HAFNIUM targeting Exchange Servers with 0-day exploits
PowerCat
2021-03-02IntezerJoakim Kennedy
When Viruses Mutate: Did SunCrypt Ransomware Evolve from QNAPCrypt?
QNAPCrypt SunCrypt
2021-03-01AcronisAcronis Security
Threat analysis: Dharma (CrySiS) ransomware
Dharma
2021-03-01AIR FORCE RESEARCH LABORATORY INFORMATION DIRECTORATETWO SIX LABS
Edge of the Art in Vulnerability Research
2021-03-01Trend MicroDon Ovid Ladores
Povlsomware Ransomware Features Cobalt Strike Compatibility
Povlsomware
2021-03-01TechtargetRob Wright
Ransomware negotiations: An inside look at the process
REvil
2021-03-01State Security Department of the Republic of LithuaniaState Security Department of the Republic of Lithuania
National Threat Assessment 2021
2021-03-01Dr.WebDr.Web
Study of the Spyder modularbackdoor for targeted attacks
Spyder
2021-03-01The RecordCatalin Cimpanu
First Fully Weaponized Spectre Exploit Discovered Online
2021-03-01Medium walmartglobaltechJason Reaves, Joshua Platt
Investigation into the state of Nim malware
BazarNimrod Cobalt Strike
2021-03-01Medium walmartglobaltechJason Reaves, Joshua Platt
Nimar Loader
BazarBackdoor BazarNimrod Cobalt Strike