Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-09Trend MicroAlfredo Oliveira, David Fiser
Threat actors now target Docker via container escape features
2021-02-09SecurehatSecurehat
Extracting the Cobalt Strike Config from a TEARDROP Loader
Cobalt Strike TEARDROP
2021-02-09TalosChris Neal, Vitor Ventura, Warren Mercer
Kasablanka Group's LodaRAT improves espionage capabilities on Android and Windows
Loda
2021-02-09Max Kersten's BlogMax Kersten
Ghidra script to decrypt strings in Amadey 1.09
Amadey
2021-02-09CofenseZachary Bailey
BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs
BazarBackdoor
2021-02-08DragosGus Serino
Recommendations Following the Oldsmar Water Treatment Facility Cyber Attack
2021-02-08WiredAndy Greenberg
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say
2021-02-08MorphisecMichael Dereviashkin
Long Live, Osiris; Banking Trojan Targets German IP Addresses
Kronos
2021-02-08CrowdStrikeSeb Walla, Tom Henry, Tom Simpson
Blocking SolarMarker Backdoor
solarmarker
2021-02-08Medium kurtikleitonkleiton0x7e
Evade EDR with Shellcode Injection and gain persistence using Registry Run Keys
2021-02-08CheckpointCheckpoint Research, Safebreach Labs
After Lightning Comes Thunder
Infy Tonnerre
2021-02-08GRNET CERTDimitris Kolotouros, Marios Levogiannis
Reverse engineering Emotet – Our approach to protect GRNET against the trojan
Emotet
2021-02-08Medium Sebdravensebdraven
Babuk is distributed packed
Babuk
2021-02-08CheckpointCheck Point Research
Domestic Kitten – An Inside Look at the Iranian Surveillance Operations
FurBall Domestic Kitten
2021-02-07Bleeping ComputerLawrence Abrams
New phishing attack uses Morse code to hide malicious URLs
2021-02-06Clairvoyance Security LabAdvanced threat research team
Mo Luoxiu (Confucius) organizes a new round of secret theft attacks on South Asian military enterprises
Ave Maria
2021-02-06Medium mariohenkelMario Henkel
Decrypting AzoRult traffic for fun and profit
Azorult
2021-02-05Silent PushKen
Behavior Clustering just got easier using new characteristics.
2021-02-05Palo Alto Networks Unit 42Efi Barkayev, Gal De Leon, Nadav Markus
Exploits in the Wild for WordPress File Manager RCE Vulnerability (CVE-2020-25213)
Kinsing
2021-02-05Trend MicroDon Ovid Ladores, Junestherry Salvador, Llalum Victoria, Monte de Jesus, Nikko Tamana, Raphael Centeno
New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker
Babuk TeslaCrypt