Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-25Trend MicroHara Hiroaki
Ambiguously Black: The Current State of Earth Hundun's Arsenal
Flagpro SPIDERPIG RAT
2022-01-25SophosAndrew Brandt
Windows services lay the groundwork for a Midas ransomware attack
Midas
2022-01-25Seguranca InformaticaPedro Tavares
WastedLocker malware analysis
WastedLocker
2022-01-25Objective-SeePatrick Wardle
Analyzing OSX.DazzleSpy
DazzleSpy
2022-01-25Nozomi NetworksAlexey Kleymenov
How to Analyze Malware for Technical Writing
DarkSide
2022-01-25SANS ISCBrad Duncan
Emotet Stops Using 0.0.0.0 in Spambot Traffic
Emotet
2022-01-25MorphisecMichael Dereviashkin
New Threat Campaign Identified: AsyncRAT Introduces a New Delivery Technique
AsyncRAT
2022-01-25SecureworksCounter Threat Unit ResearchTeam
Ransoms Demanded for Hijacked Instagram Accounts
2022-01-25Curated IntelligenceCurated Intelligence
Hacktivist group shares details related to Belarusian Railways hack
2022-01-25Palo Alto Networks Unit 42Yaron Samuel
Weaponization of Excel Add-Ins Part 1: Malicious XLL Files and Agent Tesla Case Studies
Agent Tesla
2022-01-25AvastAnh ho, Igor Morgenstern
Chasing Chaes Kill Chain
Chaes
2022-01-25Bleeping ComputerLawrence Abrams
New DeadBolt ransomware targets QNAP devices, asks 50 BTC for master key
DEADBOLT
2022-01-25SophosAndrew Brandt, Jason Jenkins
Windows services lay the groundwork for a Midas ransomware attack
2022-01-25Möbius Strip Reverse EngineeringRolf Rolles
An Exhaustively Analyzed IDB for ComLook
ComLook
2022-01-25BluelivBlueliv
Cyber Threat Intelligence for Banking & Financial Services FOLLOW THE MONEY
2022-01-25Trend MicroTrend Micro
TianySpy Malware Uses Smishing Disguised as Message From Telco
TianySpy
2022-01-25CynetOrion Threat Research and Intelligence Team
Threats Looming Over the Horizon
Cobalt Strike Meterpreter NightSky
2022-01-25TrellixAlexandre Mundo, Christiaan Beek, Leandro Velasco, Marc Elias, Max Kersten
Prime Minister’s Office Compromised: Details of Recent Espionage Campaign
Graphite
2022-01-25ESET ResearchAnton Cherepanov, Marc-Etienne M.Léveillé
Watering hole deploys new macOS malware, DazzleSpy, in Asia
2022-01-24CyCraftCyCraft AI
The Road to Ransomware Resilience, Part 2: Behavior Analysis
Conti Prometheus WastedLocker