Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-05BlackHatKevin Perlow
FASTCash and Associated Intrusion Techniques
FastCash
2020-08-04ThetaHamish Krebs
Part 1: analysing MedusaLocker ransomware
MedusaLocker
2020-08-04SophosLabs UncutAnand Ajjan, Mark Loman
WastedLocker’s techniques point to a familiar heritage
WastedLocker
2020-08-04BlackHatChung-Kuan Chen, Inndy Lin, Shang-De Jiang
Operation Chimera - APT Operation Targets Semiconductor Vendors
Cobalt Strike MimiKatz Winnti Red Charon
2020-08-04oktathegrugq
CrimeOps: The Operational Art of Cyber Crime
2020-08-03IBMAshkan Vila
InfectedNight - Mirai Variant With Massive Attacks On Our Honeypots
Mirai
2020-08-03KELASharon Bitton, Victoria Kivilevich
https://ke-la.com/back-to-school-why-cybercriminals-continue-to-target-the-education-sector/
2020-08-03McAfeeATR Operational Intelligence Team
Take a “NetWalk” on the Wild Side
Mailto
2020-08-01Group-IBGroup-IB
RedCurl: The Pentest You Didn’t Know About
RedCurl
2020-08-01Group-IBGroup-IB
RedCurl: The pentest you didn’t know about
LaZagne
2020-08-01AcronisAcronis Security
DarkSide Ransomware Does Not Attack Hospitals, Schools and Governments
DarkSide
2020-08-01Temple UniversityCARE
Critical Infrastructure Ransomware Attacks
CryptoLocker Cryptowall DoppelPaymer FriedEx Mailto Maze REvil Ryuk SamSam WannaCryptor
2020-08-01VISAVisa Security Alert
‘Baka’ JavaScript Skimmer Identified
2020-07-31PRODAFT Threat IntelligencePRODAFT
OpBlueRaven: Unveiling Fin7/Carbanak - Part 1 : Tirion
Carbanak REvil FIN7
2020-07-31SeqriteAniruddha Dolas
MassLogger: An Emerging Spyware and Keylogger
MASS Logger
2020-07-31Kaspersky LabsFedor Sinitsyn
WastedLocker: technical analysis
WastedLocker
2020-07-30Palo Alto Networks Unit 42Adrian McCabe, Alex Hinchliffe, Doel Santos, Robert Falcone
Threat Assessment: WastedLocker Ransomware
WastedLocker
2020-07-30WILDIRE LABSWILDFIRE LABS
Dissecting Ragnar Locker: The Case Of EDP
RagnarLocker
2020-07-30FireEyeJoseph Hladik, Josh Fleischer
Obscured by Clouds: Insights into Office 365 Attacks and How Mandiant Managed Defense Investigates
2020-07-29Kaspersky LabsGReAT
APT trends report Q2 2020
Vicious Panda