Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-03-16Medium CSIS TechblogAleksejs Kuprins
The Brief Glory of Cabassous/FluBot — a private Android banking botnet
FluBot
2021-03-16ElasticJoe Desimone
Detecting Cobalt Strike with memory signatures
Cobalt Strike
2021-03-16The RecordCatalin Cimpanu
France’s lead cybercrime investigator on the Egregor arrests, cybercrime
Egregor
2021-03-16FBIFBI
Alert Number CP-000142-MW: Increase in PYSA Ransomware Targeting Education Institutions
Mespinoza
2021-03-16McAfeeMcAfee ATR
Technical Analysis of Operation Diànxùn
Cobalt Strike
2021-03-16MimecastMimecast
Incident Report
SUNBURST
2021-03-16AkamaiLarry Cashdollar
Another Golang Crypto Miner On The Loose
2021-03-16The RecordDmitry Smilyanets
‘I scrounged through the trash heaps… now I’m a millionaire:’ An interview with REvil’s Unknown
REvil
2021-03-16MicrosoftMSRC Team
Guidance for responders: Investigating and remediating on-premises Exchange Server vulnerabilities
2021-03-16Department of Homeland SecurityCISA, Department of Homeland Security, Department of Justice
Foreign Interference Targeting Election Infrastructure or Political Organization, Campaign, or Candidate InfrastructureRelated to the 2020 US Related to the 2020 US Federal Elections
2021-03-16National Intelligence CouncilNational Intelligence Council
Foreign Threats to the 2020 US Federal Elections
2021-03-15BugurooBuguroo
Toddler: Credential theft through overlays and accessibility event logging
Anatsa
2021-03-15Sophos LabsMark Loman
DearCry ransomware attacks exploit Exchange server vulnerabilities
dearcry WannaCryptor
2021-03-15MiniToolHelen
Conficker - One of the Most Prevalent & Complex Windows Worms
Conficker
2021-03-15MinervaLabsTom Roter
Taurus Stealer's Evolution
Taurus Stealer
2021-03-15Palo Alto Networks Unit 42Asher Davila, Ruchna Nigam, Vaibhav Singhal, Zhibin Zhang
New Mirai Variant Targeting New IoT Vulnerabilities, Including in Network Security Devices
Mirai
2021-03-15TrustwaveJoshua Deacon
HAFNIUM, China Chopper and ASP.NET Runtime
CHINACHOPPER
2021-03-15Modern War InstituteChristopher Marsh, Mark Grzegorzewski
Incorporating the Cyberspace Domain: How Russia and China Exploit Asymmetric Advantages in Great Power Competition
2021-03-15MicrosoftMicrosoft Security Response Center
One-Click Microsoft Exchange On-Premises Mitigation Tool – March 2021
2021-03-15Council on Foreign RelationsOmree Wechsler
The Iran-Russia Cyber Agreement and U.S. Strategy in the Middle East