Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-06MalwarebytesHossein Jazi
Retrohunting APT37: North Korean APT used VBA self decode technique to inject RokRat
RokRAT
2020-12-23Group-IBViktor Okorokov
New attacks by UltraRank group
2020-12-22PrevasioSergei Shevchenko
Sunburst Backdoor, Part III: DGA & Security Software (Broken Link)
SUNBURST
2020-12-15PrevasioSergei Shevchenko
Sunburst Backdoor: A Deeper Look Into The SolarWinds' Supply Chain Malware (Broken link)
SUNBURST
2020-12-11NTT SecurityHiroki Hada
Panda’s New Arsenal: Part 3 Smanager
FunnyDream SManager Tmanger
2020-12-07Group-IBVictor Okorokov
Massive malicious campaign by FakeSecurity JS-sniffer
2020-11-18NTT SecurityHiroki Hada
Panda’s New Arsenal: Part 2 Albaniiutas
Albaniiutas
2020-10-15NTT SecurityHiroki Hada
Panda’s New Arsenal: Part 1 Tmanger
Tmanger
2020-09-18KELARaveed Laeb, Victoria Kivilevich
The Initial Access Broker’s Toolbox – Remote Monitoring and Management
2020-09-18KELARaveed Laeb, Victoria Kivilevich
The Initial Access Broker’s Toolbox – Remote Monitoring and Management
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-09-14Trend MicroAbraham Camba, Aprilyn Borja, Gilbert Sison, Jay Yaneza, Khristoffer Jocson, Ryan Maglaque
Analysis of a Convoluted Attack Chain Involving Ngrok
2020-08-06KELARaveed Laeb, Victoria Kivilevich
The Secret Life of an Initial Access Broker
2020-08-06KELARaveed Laeb, Victoria Kivilevich
The Secret Life of an Initial Access Broker
2020-05-21SophosSophosLabs Uncut
Asnarök attackers twice modified attack midstream
NOTROBIN Ragnarok
2020-05-04blackarrowBorja Merino
Ragnarok Stopper: development of a vaccine
Ragnarok