Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-08-04BlackHatDavid Evenden
Whoops, I Accidentally Helped Start the Offensive Intel Branch of a Foreign Intel Service
2021-08-04kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] MountLocker – Some pseudo-code snippets
Mount Locker
2021-08-04CrowdStrikeCrowdStrike Intelligence Team, CrowdStrike IR, Falcon OverWatch Team
PROPHET SPIDER Exploits Oracle WebLogic to Facilitate Ransomware Activity
Cobalt Strike Egregor Mount Locker Prophet Spider
2021-08-04Trend MicroJanus Agcaoili, Jessie Prevost, Joelson Soares, Ryan Maglaque
Supply Chain Attacks from a Managed Detection and Response Perspective
REvil
2021-08-04BlackHatAllison Wikoff, Richard Emerson
The Kitten that Charmed Me: The 9 Lives of a Nation State Attacker
LittleLooter
2021-08-04Security IntelligenceAllison Wikoff, Richard Emerson
ITG18: Operational Security Errors Continue to Plague Sizable Iranian Threat Group
LittleLooter
2021-08-04NetcraftGraham Edgecombe
FluBot malware spreads to Australia
FluBot
2021-08-04Jan Gruber
Understanding BlackMatter's API Hashing
BlackMatter
2021-08-04FireEyeDoug Bienstock, Josh Madeley
Cloudy with a Chance of APTNovel Microsoft 365 Attacks in the Wild
2021-08-04Zero DayKim Zetter
Pegasus Spyware: How It Works and What It Collects
Chrysaor
2021-08-04ESET ResearchZuzana Hromcová
Anatomy of Native IIS Malware (white papaer)
IISniff RGDoor
2021-08-04ESET ResearchZuzana Hromcová
Anatomy of Native IIS Malware (slides)
IISniff RGDoor
2021-08-04Sapienza University of RomeDaniele Cono D’Elia, Lorenzo Invidia
Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-driven Execution (white paper)
2021-08-04Sapienza University of RomeDaniele Cono D’Elia, Lorenzo Invidia
Rope: Bypassing Behavioral Detection of Malware with Distributed ROP-driven Execution (slides)
2021-08-04MicrosoftMicrosoft 365 Defender Research Team
Spotting brand impersonation with Swin transformers and Siamese neural networks
2021-08-04Bleeping ComputerLawrence Abrams
LockBit ransomware recruiting insiders to breach corporate networks
LockBit
2021-08-04Sentinel LABSGal Kristal
Hotcobalt – New Cobalt Strike DoS Vulnerability That Lets You Halt Operations
Cobalt Strike
2021-08-04SecureworksCounter Threat Unit ResearchTeam
Detecting Cobalt Strike: Cybercrime Attacks (GOLD LAGOON)
Cobalt Strike
2021-08-04cybleCyble
A Deep-dive Analysis of VENOMOUS Ransomware
2021-08-04Bleeping ComputerSergiu Gatlan
Energy group ERG reports minor disruptions after ransomware attack
LockBit