Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-02SecureworksCounter Threat Unit ResearchTeam
Domains Linked to Phishing Attacks Targeting Ukraine
2022-02-25SecureworksCounter Threat Unit ResearchTeam
Disruptive HermeticWiper Attacks Targeting Ukrainian Organizations
HermeticWiper
2022-02-15SecureworksCounter Threat Unit ResearchTeam
ShadowPad Malware Analysis
ShadowPad
2022-01-25SecureworksCounter Threat Unit ResearchTeam
Ransoms Demanded for Hijacked Instagram Accounts
2022-01-21SecureworksCounter Threat Unit ResearchTeam
WhisperGate: Not NotPetya
WhisperGate
2022-01-21SecureworksCounter Threat Unit ResearchTeam
Disruptive Attacks in Ukraine Likely Linked to Escalating Tensions
WhisperGate
2021-12-17SecureworksCounter Threat Unit ResearchTeam, Secureworks Incident Response Team
noPac: A Tale of Two Vulnerabilities That Could End in Ransomware
2021-12-17SecureworksCounter Threat Unit ResearchTeam, Secureworks Incident Response Team
noPac: A Tale of Two Vulnerabilities That Could End in Ransomware
2021-10-11SecureworksSecureWorks
2021 State of the Threat: A Year in Review
2021-09-22SecureworksCounter Threat Unit ResearchTeam
REvil Ransomware Reemerges After Shutdown; Universal Decryptor Released
REvil REvil
2021-08-05SecureworksCounter Threat Unit ResearchTeam
Detecting Cobalt Strike: Government-Sponsored Threat Groups (APT32)
Cobalt Strike
2021-08-04SecureworksCounter Threat Unit ResearchTeam
Detecting Cobalt Strike: Cybercrime Attacks (GOLD LAGOON)
Cobalt Strike
2021-07-20SecureworksCounter Threat Unit ResearchTeam
Ongoing Campaign Leveraging Exchange Vulnerability Potentially Linked to Iran
CHINACHOPPER MimiKatz RGDoor
2021-06-22SecureworksCounter Threat Unit ResearchTeam
LV Ransomware
REvil
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades
2021-06-03SecureworksCounter Threat Unit ResearchTeam, Secureworks Adversary Group
OAuth’s Device Code Flow Abused in Phishing Attacks
2021-06-03SecureworksCounter Threat Unit ResearchTeam, Secureworks Adversary Group
OAuth’s Device Code Flow Abused in Phishing Attacks
2021-05-13SecureworksCounter Threat Unit ResearchTeam
Ransomware Groups Use Tor-Based Backdoor for Persistent Access
DarkSide Snatch GOLD WATERFALL
2021-03-08SecureworksCounter Threat Unit ResearchTeam
SUPERNOVA Web Shell Deployment Linked to SPIRAL Threat Group
SUPERNOVA BRONZE SPIRAL
2021-01-01SecureworksSecureWorks
GOLD PRELUDE
GOLD PRELUDE