Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-08-27MorphisecMorphisec Labs
ProxyShell Exchange Exploitation Now Leads To An Increasing Amount Of Cobaltstrike Backdoors
Cobalt Strike
2021-08-27The RecordCatalin Cimpanu
Phorpiex botnet shuts down, source code goes up for sale
Phorpiex
2021-08-27JuniperAsher Langton
RealTek CVE-2021-35394 Exploited in the Wild
2021-08-27SophosMark Loman
LockFile ransomware’s box of tricks: intermittent encryption and evasion
LockFile
2021-08-26MIT Technology ReviewPatrick Howell O'Neill
Hackers are trying to topple Belarus’s dictator, with help from the inside
2021-08-26nprDina Temple-Raston
China's Microsoft Hack May Have Had A Bigger Purpose Than Just Spying
2021-08-26The New York TimesChris Buckley, Paul Mozur
Spies for Hire: China’s New Breed of Hackers Blends Espionage and Entrepreneurship
2021-08-26Minerva LabsMinerva Labs
Become A VIP Victim With New Discord Distributed Malware
BlackNET RAT RedLine Stealer
2021-08-26CrowdStrikeYaron Zinar
NTLM Keeps Haunting Microsoft
2021-08-26Advanced IntelligenceAnastasia Sentsova
From Russia With… LockBit Ransomware: Inside Look & Preventive Solutions
LockBit
2021-08-26Twitter (@ViriBack)Dee
Tweet on Vulturi Stealer and it's c2 panel
Vulturi
2021-08-26MicrosoftMicrosoft 365 Defender Threat Intelligence Team
Widespread credential phishing campaign abuses open redirector links
2021-08-26Bleeping ComputerIonut Ilascu
Ragnarok ransomware releases master decryptor after shutdown
Ragnarok
2021-08-25DataBreaches.netDissent
Advisories are published, but are enough entities reading them and taking precautions?
ALTDOS
2021-08-25Trend MicroHara Hiroaki, Ted Lee
Earth Baku An APT Group Targeting Indo-Pacific Countries With New Stealth Loaders and Backdoor
Cobalt Strike DUSTPAN SideWalk
2021-08-25TheC0mpany
GrowtopiaStealer
Growtopia
2021-08-25Recorded FutureInsikt Group®
The Business of Fraud SIM Swapping
2021-08-25BitdefenderBogdan Botezatu, Cristina Vatamanu, Eduard Budaca, Victor Vrabie
FIN8 Threat Actor Goes Agile with New Sardonic Backdoor
2021-08-25GoggleHeadedHacker BlogJacob Pimental
Reverse Engineering Crypto Functions: RC4 and Salsa20
REvil
2021-08-25Cybleinccybleinc
​LockFile Ransomware: Exploiting Microsoft Exchange Vulnerabilities Using ProxyShell
LockFile