Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-26Check PointAlex Ilgayev
Melting Ice – Tracking IcedID Servers with a few simple steps
IcedID
2021-05-26InQuestDmitry Melikov
PSChain
2021-05-26RiskIQJordan Herman
The MobileInter Skimmer: Hosted by Google, Hiding in Images
2021-05-25SentinelOneAmitai Ben Shushan Ehrlich
From Wiper to Ransomware: The Evolution of Agrius
Apostle DEADWOOD
2021-05-25Trend MicroDavid Fiser, Magno Logan
TeamTNT Targets Kubernetes, Nearly 50,000 IPs Compromised in Worm-like Attack
2021-05-25KasperskyFedor Sinitsyn, Yanis Zinchenko
Evolution of JSWorm ransomware
Nefilim Nemty
2021-05-25laceworkLacework Labs
Taking TeamTNT’s Docker Images Offline
2021-05-25Medium s2wlabDenise Dasom Kim, Hyunmin Suh, Jungyeon Lim
W4 May | EN | Story of the week: Ransomware on the Darkweb
Babuk REvil
2021-05-25FireEyeDaniel Kapellmann Zafra, Keith Lunden, Nathan Brubaker
Crimes of Opportunity: Increasing Frequency of Low Sophistication Operational Technology Compromises
2021-05-25DomainToolsTim Helming
Indicators Over Cocktails: Exporting Indicators from Iris (UNC1151)
2021-05-25Huntress LabsMatthew Brennan
Cobalt Strikes Again: An Analysis of Obfuscated Malware
Cobalt Strike
2021-05-25Chainalysis, Flashpoint
Hydra: Where The Crypto Money Laundering Trail Goes Dark
2021-05-24VinCSSm4n0w4r, Trương Quốc Ngân
[RE022] Part 1: Quick analysis of malicious sample forging the official dispatch of the Central Inspection Committee
5.t Downloader
2021-05-24AhnLabASEC Analysis Team
Vidar Info-Stealer Abusing Game Platform
Vidar
2021-05-24Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Tracking StrongPity with Yara
StrongPity
2021-05-24Atlantic CouncilSam Blazek
SCOTCH: A framework for rapidly assessing influence operations
2021-05-24Medium s2wlabSeunghoe Kim
Deep Analysis of Raccoon Stealer
Raccoon
2021-05-24MIT Technology ReviewDaniel Golden, Renee Dudley
The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms
DarkSide DarkSide
2021-05-24Jamf BlogJaron Bradley
Zero-Day TCC bypass discovered in XCSSET malware
XCSSET
2021-05-23Chuongdong blogChuong Dong
MountLocker Ransomware
Mount Locker