Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-01-26FBIFBI
PIN-20220126-001 Context and Recommendations to Protect Against Malicious Activity by Iranian Cyber Group Emennet Pasargad
Cotton Sandstorm
2022-01-26Bundesamt für VerfassungsschutzBundesamt für Verfassungsschutz
Current cyber attack campaign against German business enterprises by APT27
HyperBro
2022-01-26Cert-UACert-UA
Fragment of cyberattack research 14.01.2022
WhisperGate
2022-01-25BluelivBlueliv
Cyber Threat Intelligence for Banking & Financial Services FOLLOW THE MONEY
2022-01-23Cyber And Ramen blogMichael Rippey
Analysis of a DLL Downloader
2022-01-22csirt-moncsirt-mon
Analysis of the Cyberattack on Ukrainian Government Resources
WhisperGate
2022-01-21CrowdStrikeFalcon OverWatch Team
Better Together: The Power of Managed Cybersecurity Services in the Face of Pressing Global Security Challenges
LockBit LockBit BITWISE SPIDER
2022-01-20BrightTALK (Mandiant)John Hultquist, Matthew McWhirt
Anticipating and Preparing for Russian Cyber Activity
2022-01-20Twitter (@ClearskySec)ClearSky Cybersecurity
Tweet on ComLook backdoor used by Turla
ComLook
2022-01-20Palo Alto Networks Unit 42Josh Grunzweig, Mike Harbison, Robert Falcone
Threat Brief: Ongoing Russia and Ukraine Cyber Conflict
WhisperGate
2022-01-20MandiantJohn Hultquist
Anticipating Cyber Threats as the Ukraine Crisis Escalates
2022-01-20BleepingComputerLawrence Abrams
FBI links Diavol ransomware to the TrickBot cybercrime group
Diavol
2022-01-19Youtube (HEXORCIST)Nicolas Brulez
WhisperGate: MBR Wiper Malware Analysis. Ukraine Cyber Attack 2022
WhisperGate
2022-01-18Cyber And Ramen blogMichael Rippey
Info-Stealing Tool Posing As Naver OTP
2022-01-18ESET ResearchESET Research
ESET Research investigates Donot Team: Cyberespionage targeting military & governments in South Asia
2022-01-12Cyber And Ramen blogMike R
Analysis of njRAT PowerPoint Macros
NjRAT
2022-01-12U.S. Cyber CommandU.S. Cyber Command
Iranian intel cyber suite of malware uses open source tools
PowGoop MoriAgent
2022-01-11CISACISA, FBI, NSA
Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure
2022-01-11CISA, FBI, NSA
Understanding and Mitigating Russian State- Sponsored Cyber Threats to U.S. Critical Infrastructure
2022-01-11CybereasonChen Erlich, Daichi Shimabukuro, Niv Yona, Ofir Ozer, Omri Refaeli
Threat Analysis Report: DatopLoader Exploits ProxyShell to Deliver QBOT and Cobalt Strike
Cobalt Strike QakBot Squirrelwaffle