Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades
2021-06-14MicrosoftMicrosoft 365 Defender Research Team, Microsoft Threat Intelligence Center (MSTIC)
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
2021-06-10ESET ResearchAdam Burgher
BackdoorDiplomacy: Upgrading from Quarian to Turian
CHINACHOPPER DoublePulsar EternalRocks turian BackdoorDiplomacy
2021-06-10splunkSplunk Threat Research Team
Detecting Password Spraying Attacks: Threat Research Release May 2021
2021-06-09ESET ResearchMatthieu Faou, Thomas Dupuy
Gelsemium: When threat actors go gardening
Gelsemium
2021-06-09ESET ResearchMatthieu Faou, Thomas Dupuy
Gelsemium: When threat actors go gardening
Owlproxy
2021-06-03SecureworksCounter Threat Unit ResearchTeam, Secureworks Adversary Group
OAuth’s Device Code Flow Abused in Phishing Attacks
2021-06-03ESET Researchroman kovac
ESET Threat Report T 1 2021
Kobalos Janeleiro Vadokrist
2021-06-02Microstep Online Research Response CenterMicrostep Online Research Response Center
Analysis of Lazarus's recent targeted attacks against military industry and other industries
2021-06-02Check Point ResearchCheck Point Research
SharpPanda: Chinese APT Group Targets Southeast Asian Government With Previously Unknown Backdoor
SharpPanda
2021-05-27Check PointCheck Point Research
Uyghurs, a Turkic ethnic minority in China, targeted via fake foundations - Check Point Research
2021-05-21НКЦКИ - Главная, Ростелеком-Солар
Research report of the series of attacks on the state authorities of the Russian Federation
Mail-O
2021-05-18BlackberryBlackBerry Threat Research and Intelligence Team
Strong ARMing with MacOS: Adventures in Cross-Platform Emulation
2021-05-18Digital ShadowsPhoton Research Team
Examining Russian-language Cybercriminal Marketplaces
2021-05-17splunkSplunk Threat Research Team
DarkSide Ransomware: Splunk Threat Update and Detections
DarkSide
2021-05-17ESET ResearchCecilia Pastorino, Denise Giusto
Sex in the Digital Era: How Secure are Smart Sex Toys?
2021-05-13BI. ZONE Cyber Threats Research TeamBI.ZONE
From pentest to APT attack: cybercriminal group FIN7 disguises its malware as an ethical hacker’s toolkit
DICELOADER
2021-05-13SecureworksCounter Threat Unit ResearchTeam
Ransomware Groups Use Tor-Based Backdoor for Persistent Access
DarkSide Snatch GOLD WATERFALL
2021-05-13BlackberryBlackBerry Threat Research and Intelligence Team
Threat Thursday: SombRAT — Always Leave Yourself a Backdoor
SombRAT
2021-05-12Trend MicroTrend Micro Research
What We Know About Darkside Ransomware and the US Pipeline Attack
DarkSide