Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-30GoogleBilly Leonard, Google Threat Analysis Group
Tracking cyber activity in Eastern Europe
2022-03-30ZscalerKaivalya Khursale, Mitesh Wani
Analysis of BlackGuard - a new info stealer malware being sold in a Russian hacking forum
BlackGuard
2022-03-30ASECASEC Analysis Team
Malicious Word File Targeting Corporate Users Being Distributed
2022-03-29vmwareJason Zhang, Oleg Boyarchuk, Threat Analysis Unit
Emotet C2 Configuration Extraction and Analysis
Emotet
2022-03-29ASECASEC Analysis Team
APT Attack Impersonating Defector Resume Form (VBS SCRIPT)
2022-03-28Cyber Geeks (CyberMasterV)Vlad Pasca
A Step-by-Step Analysis of the Russian APT Turla Backdoor called TinyTurla
TinyTurla
2022-03-27Medium M3H51NM3H51N
Malware Analysis — NanoCore Rat
Nanocore RAT
2022-03-26n0p BlogAli Mosajjal
Analysis of a Caddy Wiper Sample Targeting Ukraine
CaddyWiper
2022-03-24GoogleAdam Weidemann, Google Threat Analysis Group
Countering threats from North Korea
2022-03-23vmwareSagar Daundkar, Threat Analysis Unit
SysJoker – An Analysis of a Multi-OS RAT
SysJoker SysJoker SysJoker
2022-03-23splunkShannon Davis
Gone in 52 Seconds…and 42 Minutes: A Comparative Analysis of Ransomware Encryption Speed
Avaddon Babuk BlackMatter Conti DarkSide LockBit Maze Mespinoza REvil Ryuk
2022-03-23QianxinRed Raindrop Team
Analysis of Attack Activity of PROMETHIUM Disguised
StrongPity
2022-03-22360 Threat Intelligence Center360 Threat Intelligence Center
Quantum Attack System – NSA "APT-C-40" Hacking Organization High-end Cyber Attack Weapon Technical Analysis Report (I)
2022-03-21AhnLabASEC Analysis Team
BitRAT Disguised as Windows Product Key Verification Tool Being Distributed
BitRAT TinyNuke
2022-03-21eSentireeSentire
eSentire Threat Intelligence Malware Analysis: HermeticWiper & PartyTicket
HermeticWiper PartyTicket
2022-03-21DeepInstinctAsaf Gilboa, Simon Kenin
What is Arid Gopher? An Analysis of a New, Never-Before-Seen Malware Variant
Arid Gopher AridHelper
2022-03-21VinCSSm4n0w4r, Tran Trung Kien
[QuickNote] Analysis of Pandora ransomware
Pandora
2022-03-18eSentireeSentire Threat Response Unit (TRU)
Analysis of Leaked Conti Intrusion Procedures by eSentire’s Threat Response Unit (TRU)
Conti Conti
2022-03-17Seguranca InformaticaPedro Tavares
Rook ransomware analysis
Rook
2022-03-17Github (eln0ty)Abdallah Elnoty
IcedID Analysis
IcedID