Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-08-08Security Service of UkraineSecurity Service of Ukraine
Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield
2023-08-07Trend MicroJunestherry Dela Cruz
Latest Batloader Campaigns Use Pyarmor Pro for Evasion
BATLOADER
2023-08-07SentinelOneAleksandar Milenkoski, Tom Hegel
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company
OpenCarrot
2023-07-25ZscalerMeghraj Nandanwar, Pradeep Mahato, Satyam Singh
Hibernating Qakbot: A Comprehensive Study and In-depth Campaign Analysis
QakBot
2023-07-07Rapid7 LabsCaitlin Condon
Exploitation of Mitel MiVoice Connect SA CVE-2022-29499
2023-07-04The RecordJonathan Greig
Fort Worth officials say leaked data came from Public Information Act request
SiegedSec
2023-06-23TrendmicroArianne Dela Cruz, Ieriz Nicolle Gonzalez, Ivan Nicole Chavez, Nathaniel Morales, Paul Pajares
An Overview of the Different Versions of the Trigona Ransomware
Trigona
2023-06-06Security IntelligenceAgnes Ramos-Beauchamp, Claire Zaboeva, Joshua Chung, Melissa Frydrych
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)
RokRAT
2023-05-18zimperiumNicolás Chiaraviglio
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy
OilAlpha
2023-05-16Check Point ResearchItay Cohen, Radoslaw Madej
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant
Horse Shell Camaro Dragon
2023-05-10DragosDragos
Deconstructing a Cybersecurity Event
2023-05-04SecurityScorecardVlad Pasca
How to Analyze Java Malware – A Case Study of STRRAT
STRRAT
2023-04-28Twitter (@MalGamy12)Gameel Ali
Tweet explaning similarity between Conti and Akira code
Akira
2023-04-26BitdefenderMartin Zugec
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware
BellaCiao
2023-04-14@0xToxin
PlutoCrypt - A CryptoJoker Ransomware Variant
CryptoJoker
2023-04-11China Cybersecurity Industry AllianceChina Cybersecurity Industry Alliance
Review of Cyberattacks from US Intelligence Agencies - Based on Global Cybersecurity Communities' Analyses
DuQu Flame Gauss Stuxnet
2023-04-02OALabsSergei Frankoff
AresLoader Taking a closer look at this new loader
AresLoader
2023-03-31cybleCyble
A Comprehensive Analysis of the 3CX Attack
3CX Backdoor
2023-03-29YoroiCarmelo Ragusa, Luigi Martire
DuckTail: Dissecting a complex infection chain started from social engineering
DUCKTAIL
2023-03-12Luca Mella
Makop: The Toolkit of a Criminal Gang
Makop Ransomware