Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-10LookoutApurva Kumar, Kristin Del Rosso
Lookout Discovers Novel Confucius APT Android Spyware Linked to India-Pakistan Conflict
2021-02-10Anheng Threat Intelligence CenterHunting Shadow Lab
Windows kernel zero-day exploit (CVE-2021-1732) is used by BITTER APT in targeted attack
2021-02-10Cado SecurityChristopher Doman
Punk Kitty Ransom - Analysing HelloKitty Ransomware Attacks
HelloKitty
2021-02-09Stranded on Pylos BlogJoe Slowik
Water, Water Everywhere – But Nary a Hacker to Blame
2021-02-09Twitter (@fwosar)Fabian Wosar
Tweet on CD PROJEKT RED targeted by HelloKitty ransomware group
HelloKitty
2021-02-09Medium (@alex.birsan)Alex Birsan
Dependency Confusion: How I Hacked Into Apple, Microsoft and Dozens of Other Companies
2021-02-09MicrosoftMicrosoft
3 Ways to Mitigate Risk When Using Private Package Feeds
2021-02-09Cobalt StrikeRaphael Mudge
Learn Pipe Fitting for all of your Offense Projects
Cobalt Strike
2021-02-09MicrosoftMSRC Team
Windows Win32k Elevation of Privilege Vulnerability CVE-2021-1732 (exploited ITW)
2021-02-09Trend MicroAlfredo Oliveira, David Fiser
Threat actors now target Docker via container escape features
2021-02-09SecurehatSecurehat
Extracting the Cobalt Strike Config from a TEARDROP Loader
Cobalt Strike TEARDROP
2021-02-09TalosChris Neal, Vitor Ventura, Warren Mercer
Kasablanka Group's LodaRAT improves espionage capabilities on Android and Windows
Loda
2021-02-09Max Kersten's BlogMax Kersten
Ghidra script to decrypt strings in Amadey 1.09
Amadey
2021-02-09CofenseZachary Bailey
BazarBackdoor’s Stealthy Infiltration Evades Multiple SEGs
BazarBackdoor
2021-02-08DragosGus Serino
Recommendations Following the Oldsmar Water Treatment Facility Cyber Attack
2021-02-08WiredAndy Greenberg
A Hacker Tried to Poison a Florida City's Water Supply, Officials Say
2021-02-08MorphisecMichael Dereviashkin
Long Live, Osiris; Banking Trojan Targets German IP Addresses
Kronos
2021-02-08CrowdStrikeSeb Walla, Tom Henry, Tom Simpson
Blocking SolarMarker Backdoor
solarmarker
2021-02-08Medium kurtikleitonkleiton0x7e
Evade EDR with Shellcode Injection and gain persistence using Registry Run Keys
2021-02-08CheckpointCheckpoint Research, Safebreach Labs
After Lightning Comes Thunder
Infy Tonnerre