Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-08-31YoroiLuca Mella, Luigi Martire, Yoroi
Financial Institutions in the Sight of New JsOutProx Attack Waves
JSOutProx
2021-08-31Cisco TalosEdmund Brumaghin, Vitor Ventura
Attracting flies with Honey(gain): Adversarial abuse of proxyware
2021-08-31CrowdStrikeAlexander Hanel
Sidoh: WIZARD SPIDER’s Mysterious Exfiltration Tool
Ryuk Stealer
2021-08-30Twitter (@Arkbird_SOLG)Arkbird
Tweet on MercurialGrabber
MercurialGrabber
2021-08-30QianxinRed Raindrop Team
Operation (Thủy Tinh) OceanStorm: The evil lotus hidden under the abyss
Cobalt Strike MimiKatz
2021-08-30CrowdStrikeEric Loui, Josh Reynolds
CARBON SPIDER Embraces Big Game Hunting, Part 1
Bateleur Griffon Carbanak DarkSide JSSLoader PILLOWMINT REvil
2021-08-30CrowdStrikeMichael Dawson
Hypervisor Jackpotting, Part 2: eCrime Actors Increase Targeting of ESXi Servers with Ransomware
Babuk HelloKitty REvil
2021-08-30Palo Alto Networks Unit 42Brock Mammen, Haozhe Zhang
New Mirai Variant Targets WebSVN Command Injection Vulnerability (CVE-2021-32305)
Mirai
2021-08-30CSO OnlineLucian Constantin
LockFile ransomware uses intermittent encryption to evade detection
LockFile
2021-08-30zero day initiativeSimon Zuckerbraun
ProxyToken: An Authentication Bypass in Microsoft Exchange Server
2021-08-30360 netlabAlex.Turing, GenShen Ye, Hui Wang
The Mostly Dead Mozi and Its’ Lingering Bots
Mozi
2021-08-29Medium Asuna AmawakaAsuna Amawaka
Quarians, Turians and…QuickHeal
QuickHeal
2021-08-29The DFIR ReportThe DFIR Report
Cobalt Strike, a Defender’s Guide
Cobalt Strike
2021-08-28YouTube (Kevin Bock)Kevin Bock
Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes - FOCI 21
2021-08-28The Hacker NewsRavie Lakshmanan
LockFile Ransomware Bypasses Protection Using Intermittent File Encryption
LockFile
2021-08-28abuse.chabuse.ch
MalwareBazaar | GCleaner
GCleaner
2021-08-27AonAon’s Cyber Labs, Noah Rubin
Cobalt Strike Configuration Extractor and Parser
Cobalt Strike
2021-08-27University of MarylandDave Levin, Gabriel Naval, Kevin Bock, Kyle Reese
Even Censors Have a Backup: Examining China’s Double HTTPS Censorship Middleboxes
2021-08-27Seguranca InformaticaPedro Tavares
Fraude personificando a marca Continente espalha-se através do WhatsApp: Não se deixe enganar!
2021-08-270x1c3n.tech0x1c3N
Anubis Android Malware Analysis
Anubis