Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-26FacebookFacebook
Threat Report: The State of Influence Operations 2017-2020
2021-05-26CyberScoopTim Starks
Belgium uproots cyber-espionage campaign with suspected ties to China
2021-05-26Check PointAlex Ilgayev
Melting Ice – Tracking IcedID Servers with a few simple steps
IcedID
2021-05-26InQuestDmitry Melikov
PSChain
2021-05-26RiskIQJordan Herman
The MobileInter Skimmer: Hosted by Google, Hiding in Images
2021-05-25Trend MicroDavid Fiser, Magno Logan
TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like Attack
2021-05-25KasperskyFedor Sinitsyn, Yanis Zinchenko
Evolution of JSWorm ransomware
Nefilim Nemty
2021-05-25laceworkLacework Labs
Taking TeamTNT’s Docker Images Offline
2021-05-25Medium s2wlabDenise Dasom Kim, Hyunmin Suh, Jungyeon Lim
W4 May | EN | Story of the week: Ransomware on the Darkweb
Babuk REvil
2021-05-25FireEyeDaniel Kapellmann Zafra, Keith Lunden, Nathan Brubaker
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises
2021-05-25DomainToolsTim Helming
Indicators Over Cocktails: Exporting Indicators from Iris (UNC1151)
2021-05-25Huntress LabsMatthew Brennan
Cobalt Strikes Again: An Analysis of Obfuscated Malware
Cobalt Strike
2021-05-25Chainalysis, Flashpoint
Hydra: Where The Crypto Money Laundering Trail Goes Dark
2021-05-24VinCSSm4n0w4r, Trương Quốc Ngân
[RE022] Part 1: Quick analysis of malicious sample forging the official dispatch of the Central Inspection Committee
5.t Downloader
2021-05-24Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Tracking StrongPity with Yara
StrongPity
2021-05-24Atlantic CouncilSam Blazek
SCOTCH: A framework for rapidly assessing influence operations
2021-05-24Medium s2wlabSeunghoe Kim
Deep Analysis of Raccoon Stealer
Raccoon
2021-05-24MIT Technology ReviewDaniel Golden, Renee Dudley
The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms
DarkSide DarkSide
2021-05-23Chuongdong blogChuong Dong
MountLocker Ransomware
Mount Locker
2021-05-22Youtube (ACPEnw)YouTube (ACPEnw)
Lessons Learned from a Cyber Attack System Admin Perspective
Ryuk