Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-29Recorded FutureInsikt Group®
“Beijing One Pass” Employee Benefits Software Exhibits Spyware Characteristics
2021-07-29360 Total Securitykate
“Netfilter Rootkit II ” Continues to Hold WHQL Signatures
NetfilterRootkit
2021-07-29ENISAApostolos Malatras, Eleni Tsekmezoglou, Ifigeneia Lella, Konstantinos Moulinos, Marianthi Theocharidou, Sebastian García, Veronica Valeros, Volker Distelrath
ENISA Threat Landscape for Supply Chain Attacks
2021-07-29Rasta MouseRasta Mouse
NTLM Relaying via Cobalt Strike
Cobalt Strike
2021-07-28ThreatpostLisa Vaas
BlackMatter & Haron: Evil Ransomware Newborns or Rebirths
Haron Ransomware
2021-07-28MalwarebytesHossein Jazi
Crimea “manifesto” deploys VBA Rat using double attack vectors
2021-07-28CorelightYacin Nadji
Telegram Zeek, you’re my main notice
2021-07-28RiskIQJennifer Grob, Jordan Herman
Use of XAMPP Web Component to Identify Agent Tesla Infrastructure
Agent Tesla
2021-07-28KELAVictoria Kivilevich
New Russian-Speaking Forum – A New Place for RaaS?
Babuk
2021-07-28McAfeeNoël Keijzer, Thibault Seret
Babuk: Moving to VM and *nix Systems Before Stepping Away
Babuk
2021-07-28CISAAustralian Cyber Security Centre (ACSC), CISA, FBI, NCSC UK
Top Routinely Exploited Vulnerabilities
2021-07-28ProofpointCrista Giering, Joshua Miller, Michael Raggi
I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona
Liderc SysKit
2021-07-27BitdefenderMartin Zugec, Victor Vrabie
Deep dive into a FIN8 attack – A forensic investigation
2021-07-27ZAYOTEMAbdulsamet Akinci
Diamondfox Technical Analysis Report
DiamondFox
2021-07-27ZAYOTEMHalil Filik
DarkSide Ransomware Technical Analysis Report
DarkSide
2021-07-27ZAYOTEMİlker Verimoğlu
Oski Stealer Technical Analysis Report
Oski Stealer
2021-07-27FlashpointFlashpoint
Chatter Indicates BlackMatter as REvil Successor
REvil
2021-07-27Youtube (SANS Institute)John Hammond, Katie Nickels
SANS Threat Analysis Rundown - Kaseya VSA attack
REvil
2021-07-27GigamonJoe Slowik
Ghosts on the Wire: Expanding Conceptions of Network Anomalies
SUNBURST
2021-07-27Recorded FutureInsikt Group®
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road