Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-22Twitter (@AffableKraut)Eric Brandel
A thread on possibly new magecart skimmer
magecart
2021-04-22Check PointOmer Hofman
Turning Telegram toxic: ‘ToxicEye’ RAT is the latest to use Telegram for command & control
ToxicEye
2021-04-22FortinetXiaopeng Zhang
Deep Analysis: FormBook New Variant Delivered in Phishing Campaign – Part II
Formbook
2021-04-22RiskIQRiskIQ
SolarWinds: Advancing the Story
SUNBURST
2021-04-22RiskIQAdam Castleman, Jordan Herman
Stealing All Your Information For Years With Shadow Z118 PayPal Phish Kits
2021-04-22DomainToolsJoe Slowik
An Undersea Royal Road: Exploring Malicious Documents and Associated Malware
2021-04-21Cybleinccybleinc
Donot Team APT Group Is Back To Using Old Malicious Patterns
KnSpy
2021-04-21Recorded FutureInsikt Group®
Iran-Linked Threat Actor The MABNA Institute’s Operations in 2020
2021-04-21Bleeping ComputerLawrence Abrams
Massive Qlocker ransomware attack uses 7zip to encrypt QNAP devices
2021-04-21splunkBill Wright, Dave Herrald, James Brodsky, John Stoner, Kelly Huang, Marcus LaFerrerra, Michael Natkin, Mick Baccio, Ryan Kovar, Shannon Davis, Tamara Chacon
Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
2021-04-21FacebookDavid Agranovich, Mike Dvilyanski
Taking Action Against Hackers in Palestine
SpyNote Houdini NjRAT
2021-04-21FacebookMichael Flossman, Michael Scott
Technical Paper // Taking Action Against Arid Viper
Viper RAT Micropsia
2021-04-21Bleeping ComputerLawrence Abrams
Logins for 1.3 million Windows RDP servers collected from hacker market
2021-04-21SophosLabs UncutAnand Aijan, Andrew Brandt, Markel Picado, Michael Wood, Sean Gallagher, Sivagnanam Gn, Suriya Natarajan
Nearly half of malware now use TLS to conceal communications
Agent Tesla Cobalt Strike Dridex SystemBC
2021-04-21Virus BulletinKurt Natvig
Run Your Malicious VBA Macros Anywhere!
2021-04-21ReutersJoseph Menn, Raphael Satter
Codecov hackers breached hundreds of restricted customer sites - sources
2021-04-20Bleeping ComputerLawrence Abrams
Fake Microsoft Store, Spotify sites spread info-stealing malware
Ficker Stealer
2021-04-20Medium PacktPackt
What Is Cyber Threat Intelligence?
2021-04-20ElasticWill Burgess
How attackers abuse Access Token Manipulation (ATT&CK T1134)
2021-04-20Trend MicroTrend Micro
Carbanak and FIN7 Attack Techniques