Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-08PTSecurityDenis Kuvshinov
How winnti APT grouping works
Korlia ShadowPad Winnti
2021-07-08YouTube (PT Product Update)Denis Kuvshinov
How winnti APT grouping works
Korlia ShadowPad Winnti
2021-07-08Sekoiasekoia
Kaseya: Another Massive Heist by REvil
REvil
2021-07-08vmwarePavankumar Chaudhari, Quentin Fois
IcedID: Analysis and Detection
IcedID
2021-07-08CISAUS-CERT
Malware Analysis Report (AR21-189A): DarkSide Ransomware
DarkSide
2021-07-08BlackberryThe BlackBerry Research and Intelligence Team
Threat Thursday: Redline Infostealer
RedLine Stealer
2021-07-08Bleeping ComputerSergiu Gatlan
Morgan Stanley reports data breach after vendor Accellion hack
2021-07-08McAfeeKiran Raj, Kishan N.
Zloader With a New Infection Technique
Zloader
2021-07-08Recorded FutureInsikt Group®
Chinese State-Sponsored Activity Group TAG-22 Targets Nepal, the Philippines, and Taiwan Using Winnti and Other Tooling
ShadowPad Spyder Winnti
2021-07-08KELAVictoria Kivilevich
Ransomware Gangs are Starting to Look Like Ocean’s 11
REvil
2021-07-08GigamonJoe Slowik
Observations and Recommendations from the Ongoing REvil-Kaseya Incident
REvil
2021-07-08SentinelOneAntonio Pirozzi, Idan Weizman
Conti Unpacked: Understanding Ransomware Development as a Response to Detection - A Detailed Technical Analysis
Conti
2021-07-08Medium walmartglobaltechHarold Ogden, Jason Reaves
Amadey stealer plugin adds Mikrotik and Outlook harvesting
Amadey
2021-07-08Team CymruAndy Kraus, Dan Heywood
Enriching Threat Intelligence for the Carbine Loader Crypto-jacking Campaign
2021-07-08MIT Technology ReviewPatrick Howell O'Neill
Inside the FBI, Russia, and Ukraine’s failed cybercrime investigation
2021-07-08Avast DecodedThreat Intelligence Team
Decoding Cobalt Strike: Understanding Payloads
Cobalt Strike Empire Downloader
2021-07-07YouTube (0xca7)0xca7
Snakekeylogger - Information Stealer
404 Keylogger
2021-07-07MinervaLabsMinerva Labs
Crackonosh - The Hidden Crypto Mining Malware
2021-07-07Twitter (@resecurity_com)Resecurity
Tweet REvil attack chain used against Kaseya
REvil
2021-07-07YouTube ( DuMp-GuY TrIcKsTeR)Jiří Vinopal
[2] Lokibot analyzing - spoofing GULoader and LokiBot C2 [part1] - Own implementation in Python
CloudEyE Loki Password Stealer (PWS)