Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-10-17Bleeping ComputerLawrence Abrams
REvil ransomware shuts down again after Tor sites were hijacked
REvil REvil
2021-10-15skyblue.team blogskyblue team
Recovering registry hives encrypted by LockBit 2.0
LockBit
2021-10-15Volatility LabsVolatility Labs
Memory Forensics R&D Illustrated: Detecting Mimikatz's Skeleton Key Attack
MimiKatz
2021-10-15ESET ResearchESET Research
Tweet on a malicious campaign targeting governmental and education entities in Colombia using multiple stages to drop AsyncRAT or njRAT Keylogger on their victims
AsyncRAT NjRAT
2021-10-15ZscalerRajdeepsinh Dodia
AtomSilo Ransomware Enters the League of Double Extortion
ATOMSILO
2021-10-15TrustwaveLloyd Macrohon, Rodel Mendrez
BlackByte Ransomware – Pt 2. Code Obfuscation Analysis
2021-10-15TrustwaveLloyd Macrohon, Rodel Mendrez
BlackByte Ransomware – Pt. 1 In-depth Analysis
2021-10-15Trend MicroFernando Mercês
Ransomware Operators Found Using New "Franchise" Business Model
Glupteba IcedID Mount Locker
2021-10-14Medium walmartglobaltechJason Reaves
Investigation into the state of NIM malware Part 2
Cobalt Strike NimGrabber Nimrev Unidentified 088 (Nim Ransomware)
2021-10-14SymantecThreat Hunter Team
New Yanluowang ransomware used in targeted attacks
Yanluowang
2021-10-14TrustwaveRadoslaw Zdonczyk
A Handshake with MySQL Bots
2021-10-14YouTube (Uriel Kosayev)Uriel Kosayev
DarkSide Ransomware Reverse Engineering
BlackMatter DarkSide BlackMatter DarkSide
2021-10-14Trend MicroFyodor Yarochkin, Loseway Lu, Marshall Chen, Paul Pajares
Analyzing Email Services Abused for Business Email Compromise
2021-10-14CISAUS-CERT
Alert (AA21-287A) Ongoing Cyber Threats to U.S. Water and Wastewater Systems
2021-10-14Palo Alto Networks Unit 42Daiping Liu, Jin Chen, Leo Olson, Wayne Xin, Yue Guan
Attackers Are Taking Advantage of the Open-Source Service Interactsh for Malicious Purposes
2021-10-14GoogleAjax Bash, Google Threat Analysis Group
Countering threats from Iran (APT35)
2021-10-14InkyRoger Kay
Phishers Get Clever, Use Math Symbols for Verizon Logo
2021-10-14Recorded FutureInsikt Group®
RedLine Stealer Is Key Source of Identity Data for Criminal Shops
RedLine Stealer
2021-10-14MorphisecArnold Osipov
Explosive New MirrorBlast Campaign Targets Financial Companies
MirrorBlast
2021-10-13VirusTotalVicente Diaz
We analyzed 80 million ransomware samples – here’s what we learned