Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-25Nozomi NetworksAlexey Kleymenov
How to Analyze Malware for Technical Writing
DarkSide
2022-01-24Check Point ResearchDikla Barda, Oded Vanunu, Romain Zaikin
Scammers are creating new fraudulent Crypto Tokens and misconfiguring smart contract’s to steal funds
2021-11-12Twitter (@3xp0rtblog)3xp0rt
Tweets on DarkLoader
DarkLoader
2021-09-03Twitter (@ESETresearch)ESET Research
Twitter thread on SPARKLOG, a launcher component for PRIVATELOG along with STASHLOG
PRIVATELOG STASHLOG
2021-08-26The New York TimesChris Buckley, Paul Mozur
Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship
2021-08-22Malware and StuffAndreas Klopsch
PEB: Where Magic Is Stored
Dacls
2021-08-06Sophos Naked SecurityPaul Ducklin
Conti ransomware affiliate goes rogue, leaks “gang data”
Conti
2021-08-03Twitter (@ValthekOn)Valthek
Tweet on blacklisted extensions & names of BlackMatter ransomware making the check against custom hashes values
DarkSide
2021-08-02Youtube (Forschungsinstitut Cyber Defense)Alexander Rausch, Konstantin Klinger
The CODE 2021: Workshop presentation and demonstration about CobaltStrike
Cobalt Strike
2021-07-19ProofpointJoe Wise, Konstantin Klinger, Proofpoint Threat Research Team, Selena Larson
New Threat Actor Uses Spanish Language Lures to Distribute Seldom Observed Bandook Malware
Bandook Caliente Bandits
2021-06-22DarktraceOakley Cox
Crypto-mining on a DNS server
2021-06-17IntezerRyan Robinson
Klingon RAT Holding on for Dear Life
KlingonRAT
2021-06-17ProofpointDennis Schwarz, Konstantin Klinger, Selena Larson
New TA402 Molerats Malware Targets Governments in the Middle East
Molerat Loader
2021-05-27cyberpunkleighcyberpunkleigh
Apostle Ransomware Analysis
Apostle
2021-05-19Nozomi NetworksAlexey Kleymenov
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
DarkSide
2021-04-16Trend MicroAriel Neimond Lazaro, Dechao Zhao, Luis Magisa, Steven Du
XCSSET Quickly Adapts to macOS 11 and M1-based Macs
XCSSET
2021-03-09360 netlabJiaYu
Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities
2021-02-22AdvIntelBeatriz Pimenta Klein
Economic Growth, Digital Inclusion, & Specialized Crime: Financial Cyber Fraud in LATAM
BRATA Mekotio Metamorfo Ploutus ATM VictoryGate
2021-02-08Medium kurtikleitonkleiton0x7e
Evade EDR with Shellcode Injection and gain persistence using Registry Run Keys
2021-01-26FireEyeBernard Sapaden, Mohammed Mohsin Dalla, Rahul Mohandas, Sachin Shukla, Srini Seethapathy, Sujnani Ravindra
Phishing Campaign Leverages WOFF Obfuscation and Telegram Channels for Communication