Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-16RiskIQJordan Herman
Bit2Check: Investigating Actors in the Carding Space
2021-06-16ProofpointDaniel Blackford, Garrett M. Graff, Selena Larson
The First Step: Initial Access Leads to Ransomware
BazarBackdoor Egregor IcedID Maze QakBot REvil Ryuk TrickBot WastedLocker TA570 TA575 TA577
2021-06-16nur.pubTwitter (@1umos_)
Cerberus Analysis - Android Banking Trojan
Cerberus
2021-06-16The RecordCatalin Cimpanu
Ukrainian police arrest Clop ransomware members, seize server infrastructure
Clop
2021-06-16Advanced IntelligenceVitali Kremez, Yelisey Boguslavskiy
The Rise & Demise of Multi-Million Ransomware Business Empire
Avaddon
2021-06-15vmwareTakahiro Haruyama
Detecting UEFI Bootkits in the Wild (Part 1)
LoJax MosaicRegressor TrickBot
2021-06-15KasperskySeongsu Park
Andariel evolves to target South Korea with ransomware
BISTROMATH PEBBLEDASH SHATTEREDGLASS TigerLite Tiger RAT
2021-06-15Silent PushSilent Push
Infra-Tagging -a new tool in Cyber Threat Intelligence
2021-06-15PARAFLAREDaniel Eden
A Defender's Perspective of SSL VPN Exploitation
2021-06-15ID RansomwareAndrew Ivanov
TargetCompany Ransomware
TargetCompany
2021-06-15Perception PointShai Golderman
Insights Into an Excel 4.0 Macro Attack using Qakbot Malware
QakBot
2021-06-15The RecordCatalin Cimpanu
Source code for Paradise ransomware leaked on hacking forums
Paradise
2021-06-15ICRCICRC
Avoiding Civilian Harm from Military Cyber Operations during Armed Conflicts
2021-06-15ViceJoseph Cox
Ransomware Gang Turns to Revenge Porn
2021-06-15TenableDerek Melber
How to Protect Active Directory Against Ransomware Attacks
2021-06-15360 Threat Intelligence Center360 Fiberhome Laboratory
PJobRAT: Spyware targeting Indian military personnel
PjobRAT
2021-06-15Trend MicroByron Gelera, Earle Earnshaw, Janus Agcaoili, Miguel Ang, Nikko Tamana
Ransomware Double Extortion and Beyond: REvil, Clop, and Conti
Clop Conti REvil
2021-06-15Nextron SystemsNextron Systems
Use YARA math Module Extension in THOR TechPreview and THOR Lite
2021-06-15ElasticGabriel Landau
What you need to know about Process Ghosting, a new executable image tampering attack
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades