Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-28CorelightYacin Nadji
Telegram Zeek, you’re my main notice
2021-07-28DomainToolsChad Anderson
Finding AnchorDNS C2s With Iris Investigate
AnchorDNS
2021-07-28PrevailionPrevailion
Cert Safari: Leveraging TLS Certificates to Hunt Evil
2021-07-28RiskIQJennifer Grob, Jordan Herman
Use of XAMPP Web Component to Identify Agent Tesla Infrastructure
Agent Tesla
2021-07-28SUCURIBen Martin
Stylish Magento Card Stealer loads Without Script Tags
2021-07-28KELAVictoria Kivilevich
New Russian-Speaking Forum – A New Place for RaaS?
Babuk
2021-07-28McAfeeNoël Keijzer, Thibault Seret
Babuk: Moving to VM and *nix Systems Before Stepping Away
Babuk
2021-07-28CISAAustralian Cyber Security Centre (ACSC), CISA, FBI, NCSC UK
Top Routinely Exploited Vulnerabilities
2021-07-28ProofpointCrista Giering, Joshua Miller, Michael Raggi
I Knew You Were Trouble: TA456 Targets Defense Contractor with Alluring Social Media Persona
Liderc SysKit
2021-07-27BitdefenderMartin Zugec, Victor Vrabie
Deep dive into a FIN8 attack – A forensic investigation
2021-07-27Trend MicroAlfredo Oliveira, David Fiser
Threat Actors Exploit Misconfigured Apache Hadoop YARN
Kinsing
2021-07-27ZAYOTEMAbdulsamet Akinci
Diamondfox Technical Analysis Report
DiamondFox
2021-07-27ZAYOTEMHalil Filik
DarkSide Ransomware Technical Analysis Report
DarkSide
2021-07-27ZAYOTEMİlker Verimoğlu
Oski Stealer Technical Analysis Report
Oski Stealer
2021-07-27Twitter (@fwosar)Fabian Wosar
Tweet on new REvil variant
REvil
2021-07-27FlashpointFlashpoint
Chatter Indicates BlackMatter as REvil Successor
REvil
2021-07-27Youtube (SANS Institute)John Hammond, Katie Nickels
SANS Threat Analysis Rundown - Kaseya VSA attack
REvil
2021-07-27GigamonJoe Slowik
Ghosts on the Wire: Expanding Conceptions of Network Anomalies
SUNBURST
2021-07-27Recorded FutureInsikt Group®
China’s Digital Colonialism: Espionage and Repression Along the Digital Silk Road
2021-07-27Palo Alto Networks Unit 42Alex Hinchliffe, Mike Harbison
THOR: Previously Unseen PlugX Variant Deployed During Microsoft Exchange Server Attacks by PKPLUG Group
PlugX