Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-15Trend MicroByron Gelera, Earle Earnshaw, Janus Agcaoili, Miguel Ang, Nikko Tamana
Ransomware Double Extortion and Beyond: REvil, Clop, and Conti
Clop Conti REvil
2021-06-15ElasticGabriel Landau
What you need to know about Process Ghosting, a new executable image tampering attack
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades
2021-06-15NCC GroupMichael Matthews, NCC RIFT, William Backhouse
Handy guide to a new Fivehands ransomware variant
FiveHands
2021-06-14Marco Ramilli's BlogMarco Ramilli
The Allegedly Ryuk Ransomware builder: #RyukJoke
Chaos
2021-06-14CYBER GEEKS All Things InfosecCyberMasterV
A Step-by-Step Analysis of a New Version of DarkSide Ransomware
DarkSide
2021-06-14scotthelme.co.ukScott Helme
Introducing Script Watch: Detect Magecart style attacks, fast!
magecart
2021-06-14The RecordCatalin Cimpanu
G7 calls on Russia to crack down on ransomware gangs
2021-06-14nccgroupFox-IT Data Science Team, NCCGroup
Incremental Machine Learning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
2021-06-13SecJuiceSecprentice
Blue Team Detection: DarkSide Ransomware
DarkSide
2021-06-12Twitter (@AltShiftPrtScn)Peter Mackenzie
A thread on RagnarLocker ransomware group's TTP seen in an Incident Response
Cobalt Strike RagnarLocker
2021-06-12YouTube (BSidesBoulder)Kaspersky, Kurt Baumgartner
Same and Different - sesame street level attribution
Kazuar SUNBURST
2021-06-11Quick HealDigvijay Mane
Google Play store applications laced with Joker malware yet again
Joker
2021-06-11TEAMT5Linda Kuo, Zih-Cing Liao
Story of the ‘Phisherman’ -Dissecting Phishing Techniques of CloudDragon APT (slides)
Appleseed BabyShark
2021-06-11YouTube (Hack In The Box Security Conference)Linda Kuo, Zih-Cing Liao
Dissecting Phishing Techniques Of CloudDragon APT
Appleseed BabyShark
2021-06-11TencentThe Tencent Security Threat Intelligence Center
Tencent Security Report: Purple Fox virus maliciously attacks SQL server and spreads like a worm
PurpleFox
2021-06-11Twitter (@MsftSecIntel)Microsoft Security Intelligence
Tweet on solarmarker/Jupyter malware
solarmarker
2021-06-11The RecordCatalin Cimpanu
Cybercrime Featured Avaddon ransomware operation shuts down and releases decryption keys
Avaddon
2021-06-11Bleeping ComputerLawrence Abrams
Avaddon ransomware shuts down and releases decryption keys
Avaddon
2021-06-11SophosLabs UncutAnand Ajjan, Andrew Brandt, Hajnalka Kope, Mark Loman, Peter Mackenzie
Relentless REvil, revealed: RaaS as variable as the criminals who use it
REvil