Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-01Silent PushSilent Push
Privacy tools (not) for you
SmokeLoader
2022-01-01Silent PushAfonso Knudsen, Inês Véstia
Lapsus$ Group (DEV-0537/UNC3661) - an emerging dark net threat actor leveraging insider threats-or was it?
2022-01-01Silent PushSilent Push
Consequences- The Conti Leaks and future problems
Cobalt Strike Conti
2022-01-01Silent PushSilent Push
Phishing sites on bulletproof hosting infrastructure
2022-01-01Silent PushSilent Push
Phishing infrastructure used to target US government contractors
2022-01-01Silent PushSilent Push
Credit card phishing using NHS Covid Pass as a lure
2022-01-01Silent PushSilent Push
USPS phishing on a bulletproof hosting network
2022-01-01Silent PushSilent Push
Log4shell: a threat intelligence perspective
2022-01-01Silent PushSilent Push
Explore Historic DNS -search with risk scores
2022-01-01Silent PushSilent Push
The Manipulaters Team Blog Post
2022-01-01Silent PushSilent Push
Portuguese Bank phishing (Portuguese version)
2022-01-01Silent PushAfonso Knudsen
Portuguese Bank phishing
2022-01-01Silent PushSilent Push
The Dangers of Spoofing
2022-01-01Toli SecurityTolisec
Cryptomining botnet exploiting exposed Docker API
2022-01-01Toli SecurityToli Security
IoT Botnet exploiting Log4J CVE-2021-44228
2022-01-01Toli SecurityToli Security
Active crypto-mining operation by TeamTNT
TeamTNT
2022-01-01forensicitguyTony Lambert
Analyzing an IcedID Loader Document
IcedID
2021-12-310ffset BlogChuong Dong
HANCITOR: Analysing The Main Loader
Hancitor
2021-12-31victory mediumZach Edwards
Compromised Godaddy Infrastructure Attacking Numerous U.S. Government Websites to Promote “Canadian Pharmacy” Scam Websites
2021-12-31CERT.PLMarcin Dudek, Michał Praszmo
IKO activation - Malware campaign
Coper