Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-21Recorded FutureInsikt Group®
Iran-Linked Threat Actor The MABNA Institute’s Operations in 2020
2021-04-21Bleeping ComputerLawrence Abrams
Massive Qlocker ransomware attack uses 7zip to encrypt QNAP devices
2021-04-21splunkBill Wright, Dave Herrald, James Brodsky, John Stoner, Kelly Huang, Marcus LaFerrerra, Michael Natkin, Mick Baccio, Ryan Kovar, Shannon Davis, Tamara Chacon
Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
2021-04-21FacebookDavid Agranovich, Mike Dvilyanski
Taking Action Against Hackers in Palestine
SpyNote Houdini NjRAT
2021-04-21FacebookMichael Flossman, Michael Scott
Technical Paper // Taking Action Against Arid Viper
Viper RAT Micropsia
2021-04-21Bleeping ComputerLawrence Abrams
Logins for 1.3 million Windows RDP servers collected from hacker market
2021-04-21SophosLabs UncutAnand Aijan, Andrew Brandt, Markel Picado, Michael Wood, Sean Gallagher, Sivagnanam Gn, Suriya Natarajan
Nearly half of malware now use TLS to conceal communications
Agent Tesla Cobalt Strike Dridex SystemBC
2021-04-21Virus BulletinKurt Natvig
Run Your Malicious VBA Macros Anywhere!
2021-04-21ReutersJoseph Menn, Raphael Satter
Codecov hackers breached hundreds of restricted customer sites - sources
2021-04-20Bleeping ComputerLawrence Abrams
Fake Microsoft Store, Spotify sites spread info-stealing malware
Ficker Stealer
2021-04-20Medium PacktPackt
What Is Cyber Threat Intelligence?
2021-04-20ElasticWill Burgess
How attackers abuse Access Token Manipulation (ATT&CK T1134)
2021-04-20Trend MicroTrend Micro
Carbanak and FIN7 Attack Techniques
2021-04-20360 Threat Intelligence CenterAdvanced Threat Institute
Transparent Tribe uses the new crown vaccine hotspot to analyze the targeted attacks on the Indian medical industry
Crimson RAT
2021-04-20IntezerJoakim Kennedy
HabitsRAT Used to Target Linux and Windows Servers
HabitsRAT
2021-04-20FireEyeDan Perez, Dimiter Andonov, Greg Wood, Jacob Thompson, Jonathan Lepore, Josh Triplett, Joshua Villanueva, Regina Elwell, Sarah Jones, Stephen Eckels, Stroz Friedberg
Check Your Pulse: Suspected APT Actors Leverage Authentication Bypass Techniques and Pulse Secure Zero-Day
2021-04-20IntezerJoakim Kennedy
HabitsRAT Used to Target Linux and Windows Servers
HabitsRAT
2021-04-20Medium walmartglobaltechJason Reaves
CobaltStrike Stager Utilizing Floating Point Math
Cobalt Strike
2021-04-20NHK WORLD-JAPANNHK WORLD-JAPAN
China's PLA blamed for cyberattacks in Japan
2021-04-20NHK WORLD-JAPANNHK WORLD-JAPAN
China's PLA allegedly behind cyberattacks in Japan