Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-11-17MalwareTechMarcus Hutchins
An in-depth look at hacking back, active defense, and cyber letters of marque
2021-11-17Medium ThreatMinerThreatMiner
Android Trojan Targeting Korean Demographic using GitHub for C2
Unidentified APK 006
2021-11-17MandiantJoshua Goddard
ProxyNoShell: A Change in Tactics Exploiting ProxyShell Vulnerabilities
2021-11-17IBMShahar Tavor
BrazKing Android Malware Upgraded and Targeting Brazilian Banks
PixStealer
2021-11-17Investigative reporting project ItalyLorenzo Bagnoli, Riccardo Coluccini
Sorveglianza: l’azienda italiana che vuole sfidare i colossi NSO e Palantir
Chrysaor
2021-11-17nvisoDidier Stevens
Cobalt Strike: Decrypting Obfuscated Traffic – Part 4
Cobalt Strike
2021-11-17RiskIQJennifer Grob
Aggah Campaign Replaces Crypto Currency Addresses with Their Own
2021-11-17Trend MicroAbdelrhman Sharshar, Mohamed Fahmy, Ryan Maglaque, Sherif Magdy
Analyzing ProxyShell-related Incidents via Trend Micro Managed XDR
Cobalt Strike Cotx RAT
2021-11-17BBCJoe Tidy
Evil Corp: 'My hunt for the world's most wanted hackers'
REvil REvil
2021-11-16MicrosoftMicrosoft Threat Intelligence
Evolving trends in Iranian threat actor activity – MSTIC presentation at CyberWarCon 2021
APT35 Gray Sandstorm
2021-11-16AhnLabASEC Analysis Team
Analysis Report of Kimsuky Group's APT Attacks (AppleSeed, PebbleDash)
Appleseed PEBBLEDASH
2021-11-16sysdigStefano Chierici
Hands-On Muhstik Botnet: crypto-mining attacks targeting Kubernetes
Tsunami
2021-11-16IronNetIronNet Threat Research, Joey Fitzpatrick, Morgan Demboski, Peter Rydzynski
How IronNet's Behavioral Analytics Detect REvil and Conti Ransomware
Cobalt Strike Conti IcedID REvil
2021-11-16PC's Xcetra SupportDavid Ledbetter
Excel 4 macro code obfuscation
BazarBackdoor
2021-11-16HornetsecuritySecurity Lab
Comeback of Emotet
Emotet
2021-11-16ZscalerDeepen Desai
Return of Emotet malware
Emotet
2021-11-16Twitter (@_CPResearch_)Check Point Research
Tweet on 32bit version of CVE-2021-1732 exploited by BITTER group
2021-11-16Twitter (@_icebre4ker_)Fr4
Tweet about Aberebot source code put up for sale by the developer
Aberebot
2021-11-16Twitter (@kienbigmummy)m4n0w4r
Tweet on short analysis of QakBot
QakBot
2021-11-16Recorded FutureInsikt Group®
Cyber Threats to Veterans in 2021: Spam and Scams Exploit Support for Veterans