Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-10-01ZeroFoxStephan Simon
Babuk Ransomware Variant Delta Plus Used in Live Attacks After Source Code Leaked
Babuk
2021-09-30Kaspersky LabsKaspersky Labs
GhostEmperor’s infection chain and post-exploitation toolset: technical detail
GhostEmperor GhostEmperor
2021-09-30PTSecurityPT ESC Threat Intelligence
Masters of Mimicry: new APT group ChamelGang and its arsenal
Cobalt Strike
2021-09-30FortinetFred Gutierrez, Shunichi Imano
Ranion Ransomware - Quiet and Persistent RaaS
Ranion
2021-09-30PTSecurityPT Expert Security Center
Masters of Mimicry: new APT group ChamelGang and its arsenal
DoorMe Chamelgang
2021-09-30G DataKarsten Hahn
All your hashes are belong to us: An overview of malware hashing algorithms
2021-09-30Medium proferosec-osmBrenton Morris
RansomEXX, Fixing Corrupted Ransom
RansomEXX
2021-09-30CiscoArnaud Zobec, Vitor Ventura
A wolf in sheep's clothing: Actors spread malware by leveraging trust in Amnesty International and fear of Pegasus
2021-09-30Trend MicroLuis Magisa, Steven Du
Mac Users Targeted by Trojanized iTerm2 App
ZuRu
2021-09-30PT Expert Security Center
Masters of Mimicry: new APT group ChamelGang and its arsenal
Cobalt Strike
2021-09-30laceworkLacework Labs
Mirai goes Stealth – TLS & IoT Malware
Mirai VPNFilter
2021-09-30SentinelOneAmitai Ben Shushan Ehrlich
New Version Of Apostle Ransomware Reemerges In Targeted Attack On Higher Education
Apostle
2021-09-30Palo Alto Networks Unit 42Brady Stout
Credential Harvesting at Scale Without Malware
2021-09-30BlackberryThe BlackBerry Research & Intelligence Team
Threat Thursday: xLoader Infostealer
Xloader Formbook
2021-09-30KasperskyAseel Kayal, Mark Lechtik, Paul Rascagnères, Vasily Berdnikov
GhostEmperor: From ProxyLogon to kernel mode
GhostEmperor GhostEmperor
2021-09-30CrowdStrikeFalcon OverWatch Team
Hunting for the Confluence Exploitation: When Falcon OverWatch Becomes the First Line of Defense
Cobalt Strike
2021-09-29Silent PushSilent Push
Evaluating the Value of Security Intelligence Feeds with Silent Push
2021-09-29Malware Traffic AnalysisBrad Duncan
Hancitor with Cobalt Strike
Cobalt Strike Hancitor
2021-09-29Check PointBohdan Melnykov, Israel Wernik
PixStealer: a new wave of Android banking Trojans abusing Accessibility Services
2021-09-29Kaspersky LabsIvan Kwiatkowski, Pierre Delcher
DarkHalo after SolarWinds: the Tomiris connection (UNC2849)
tomiris Storm-0473