Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-07Bleeping ComputerLawrence Abrams
New phishing attack uses Morse code to hide malicious URLs
2021-02-06Clairvoyance Security LabAdvanced threat research team
Mo Luoxiu (Confucius) organizes a new round of secret theft attacks on South Asian military enterprises
Ave Maria
2021-02-06Medium mariohenkelMario Henkel
Decrypting AzoRult traffic for fun and profit
Azorult
2021-02-05Silent PushKen
Behavior Clustering just got easier using new characteristics.
2021-02-05MorphisecNadav Lorber
CinaRAT Resurfaces with New Evasive Tactics and Techniques
Quasar RAT
2021-02-05Palo Alto Networks Unit 42Efi Barkayev, Gal De Leon, Nadav Markus
Exploits in the Wild for WordPress File Manager RCE Vulnerability (CVE-2020-25213)
Kinsing
2021-02-05Trend MicroDon Ovid Ladores, Junestherry Salvador, Llalum Victoria, Monte de Jesus, Nikko Tamana, Raphael Centeno
New in Ransomware: Seth-Locker, Babuk Locker, Maoloa, TeslaCrypt, and CobraLocker
Babuk TeslaCrypt
2021-02-05Twitter (@8th_grey_owl)8thGreyOwl
Tweet on CALMTHORN, used by Tonto Team
CALMTHORN
2021-02-05EpicTurlaJuan Andrés Guerrero-Saade
Voltron STA The curious case of 0xFancyFilter
fancyfilter MISTYVEAL Regin
2021-02-05Bleeping ComputerSergiu Gatlan
Microsoft warns of increasing OAuth Office 365 phishing attacks
2021-02-05Team CymruDavid Monnier
Kobalos Malware Mapping Potentially Impacted Networks and IP Address Mapping
Kobalos
2021-02-04YoroiLuca Mella, Luigi Martire
Connecting the dots inside the Italian APT Landscape
2021-02-04BitdefenderBogdan Botezatu
Fonix Ransomware Decryptor
FONIX
2021-02-04HALAimad Berady, Gilles Guette, Mathieu Jaume, Valérie Viet Triem Tong
From TTP to IoC: Advanced Persistent Graphs forThreat Hunting
2021-02-04ClearSkyClearSky Research Team
CONTI Modus Operandi and Bitcoin Tracking
Conti Ryuk
2021-02-04InfoSec Handlers Diary BlogBojan Zdrnja
Abusing Google Chrome extension syncing for data exfiltration and C&C
2021-02-04ChainanalysisChainalysis Team
Blockchain Analysis Shows Connections Between Four of 2020’s Biggest Ransomware Strains
DoppelPaymer Egregor Maze SunCrypt
2021-02-04GraphikaBen Nimmo, Ira Hubert, Yang Cheng
Spamouflage Breakout: Chinese Spam Network Finally Starts To Gain Some Traction
2021-02-04ENKIENKI
Internet Explorer 0day 분석
2021-02-03ZDNetCharlie Osborne
Ursnif Trojan has targeted over 100 Italian banks
ISFB Snifula