Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-26AWAKEAshish Gahlot
Threat Hunting for Avaddon Ransomware
Avaddon
2020-10-26Arbor NetworksSuweera De Souza
Dropping the Anchor
AnchorDNS Anchor TrickBot
2020-10-26WiredAndy Greenberg
The Russian Hackers (BERSERK BEAR) Playing 'Chekhov's Gun' With US Infrastructure
2020-10-26ThreatConnectThreatConnect Research Team
ThreatConnect Research Roundup: Ryuk and Domains Spoofing ESET and Microsoft
Ryuk
2020-10-26QianxinThreat Intelligence Center
Analysis of the attack activities of the Rattlesnake organization using the Buffy bilateral agreement as bait
SideWinder
2020-10-26CheckpointEyal Itkin, Itay Cohen
Exploit Developer Spotlight: The Story of PlayBit
Dyre Maze PyLocky Ramnit REvil
2020-10-24KrabsOnSecurityMr. Krabs
Gacrux – a basic C malware with a custom PE loader
Gacrux
2020-10-24KrabsOnSecurityMr. Krabs
Gacrux – a basic C malware with a custom PE loader
2020-10-23@krabsonsecurity
Tweet: An interesting tidbit: it has a Mach-O bin
Xloader
2020-10-23HornetsecurityHornetsecurity Security Lab
Leakware-Ransomware-Hybrid Attacks
Avaddon Clop Conti DarkSide DoppelPaymer Mailto Maze Mespinoza Nefilim RagnarLocker REvil Sekhmet SunCrypt
2020-10-23AP NewsFrank Bajak
Report: Ransomware disables Georgia county election database
DoppelPaymer
2020-10-23Medium HorkosAlex Orleans
A Last Clever Knot?
2020-10-23ReutersChristopher Bing
Exclusive: National Guard called in to thwart cyberattack in Louisiana weeks before election
KimJongRat
2020-10-23ReutersChristopher Bing, Jack Stubbs
Exclusive: 'Dumb mistake' exposed Iranian hand behind fake Proud Boys U.S. election emails - sources
2020-10-22BellingcatBellingcat Investigation Team
Russian Vehicle Registration Leak Reveals Additional GRU Hackers
2020-10-22Kaspersky LabsAnton Kuzmenko
On the trail of the XMRig miner
2020-10-22Bleeping ComputerLawrence Abrams
French IT giant Sopra Steria hit by Ryuk ransomware
Ryuk
2020-10-22Sentinel LABSMarco Figueroa
An Inside Look at How Ryuk Evolved Its Encryption and Evasion Techniques
Ryuk
2020-10-22ZDNetCatalin Cimpanu
EU sanctions Russia over 2015 German Parliament hack
2020-10-21G DataKarsten Hahn
T-RAT 2.0: Malware control via smartphone
T-RAT 2.0