Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-09CrowdStrikeJason Rivera, Josh Burgess
From Zero to SixtyThe Story of North Korea’s Rapid Ascent to Becoming a Global Cyber Superpower
FastCash Hermes WannaCryptor
2020-12-09MicrosoftMicrosoft 365 Defender Research Team
EDR in block mode stops IcedID cold
IcedID
2020-12-09Palo Alto Networks Unit 42Chris Navarrete, Haozhe Zhang, Yanhui Jia
njRAT Spreading Through Active Pastebin Command and Control Tunnel
NjRAT
2020-12-09IntezerJoakim Kennedy
A Zebra in Gopher's Clothing: Russian APT Uses COVID-19 Lures to Deliver Zebrocy
Zebrocy
2020-12-09InfoSec Handlers Diary BlogBrad Duncan
Recent Qakbot (Qbot) activity
Cobalt Strike QakBot
2020-12-09Trend MicroEcular Xu, Jaromír Hořejší, Joseph C Chen
SideWinder Leverages South Asian Territorial Issues for Spear Phishing and Mobile Device Attacks
Meterpreter SideWinder RAZOR TIGER
2020-12-08Cobalt StrikeRaphael Mudge
A Red Teamer Plays with JARM
Cobalt Strike
2020-12-08SecuronixDen Iyzvyk, Oleg Kolesnikov
Detecting SolarWinds/SUNBURST/ECLIPSER Supply Chain Attacks
SUNBURST
2020-12-08DomainToolsJoe Slowik
Identifying Critical Infrastructure Targeting through Network Creation
2020-12-08Palo Alto Networks Unit 42Brittany Barbehenn, Doel Santos, Robert Falcone
Threat Assessment: Egregor Ransomware
Egregor
2020-12-08FireEyeKevin Mandia
FireEye Shares Details of Recent Cyber Attack, Actions to Protect Community
2020-12-08ZDNetCatalin Cimpanu
Norway says Russian hacking group APT28 is behind August 2020 Parliament hack
2020-12-08SophosAnand Aijan, Bill Kearney, Gabor Szappanos, Mark Loman, Peter Mackenzie, Sean Gallagher, Sergio Bestulic, Syed Shahram
Egregor ransomware: Maze’s heir apparent
Egregor Maze
2020-12-07CensysCensys
Advanced Persistent Infrastructure Tracking
WellMess
2020-12-07GoogleBernhard Grill, Borbala Benko, Cecilia M. Procopiuc, David Tao, Elie Bursztein, Fabian Kaczmarczyck, Jennifer Pullman, Luca Invernizzi
Spotlight: Malware Lead Generation at Scale
2020-12-07QianxinRed Raindrop Team
Blocking APT: Qi'anxin QOWL engine defeats BITTER's targeted attacks on domestic government and enterprises
2020-12-07ProofpointProofpoint Threat Research Team
Commodity .NET Packers use Embedded Images to Hide Payloads
Agent Tesla Loki Password Stealer (PWS) Remcos
2020-12-07Group-IBVictor Okorokov
Massive malicious campaign by FakeSecurity JS-sniffer
2020-12-07NSANSA
Russian State-Sponsored Actors Exploiting Vulnerability in VMware® Workspace ONE Access Using Compromised Credentials
2020-12-07Reversing LabsKarlo Zanki
Rana Android Malware Your past catches up, sooner or later...
Rana