Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-19Nozomi NetworksAlexey Kleymenov
Colonial Pipeline Ransomware Attack: Revealing How DarkSide Works
DarkSide
2021-05-19Bleeping ComputerAdam Janofsky
Qlocker ransomware shuts down after extorting hundreds of QNAP users
2021-05-19The RecordAdam Janofsky
SolarWinds CEO apologizes for blaming an intern, says attack may have started in January 2019
2021-05-19Bleeping ComputerSergiu Gatlan
May Android security updates patch 4 zero-days exploited in the wild
2021-05-19Youtube (OALabs)Sergei Frankoff
Reverse Engineering Warzone RAT - Part 1
Ave Maria
2021-05-19malware.loveRobert Giczewski
Python stealer distribution via excel maldoc
2021-05-19Palo Alto Networks Unit 42Brad Duncan
BazarCall: Call Centers Help Spread BazarLoader Malware
BazarBackdoor campoloader
2021-05-19Politie NLPolitie NL
Aanhouding in onderzoek naar cybercrime
Imminent Monitor RAT
2021-05-19Intel 471Intel 471
Look how many cybercriminals love Cobalt Strike
BazarBackdoor Cobalt Strike Hancitor QakBot SmokeLoader SystemBC TrickBot
2021-05-19The Wall Street JournalCollin Eaton
Colonial Pipeline CEO Tells Why He Paid Hackers a $4.4 Million Ransom
DarkSide DarkSide
2021-05-19Twitter (@ThreatFabric)ThreatFabric
Tweet on Anatsa android banking trojan targeting 7 more italian banks
Anatsa
2021-05-18CrowdStrikeKaran Sood, Liviu Arsene, Shaun Hurley
DarkSide Goes Dark: How CrowdStrike Falcon Customers Were Protected
DarkSide DarkSide
2021-05-18KEYSIGHT TECHNOLOGIESRadu Emanuel Chiscariu
DarkSide Ransomware Behavior and Techniques
DarkSide
2021-05-18Bleeping ComputerIonut Ilascu
DarkSide ransomware made $90 million in just nine months
DarkSide DarkSide Egregor Gandcrab Mailto Maze REvil Ryuk
2021-05-18Github (Finch4)Finch
Analysis of MountLocker
Mount Locker
2021-05-18RECON INFOSECAndrew Cook
An Encounter With TA551/Shathak
IcedID
2021-05-18SophosGreg Iddon, John Shier, Mat Gangwer, Peter Mackenzie
The Active Adversary Playbook 2021
Cobalt Strike MimiKatz
2021-05-18BlackberryBlackBerry Threat Research and Intelligence Team
Strong ARMing with MacOS: Adventures in Cross-Platform Emulation
2021-05-18ElasticApoorva Joshi, Craig Chamberlain, Disha Dasgupta
ProblemChild: Detecting living-off-the-land attacks using the Elastic Stack
2021-05-18Youtube (AhmedS Kasmani)AhmedS Kasmani
Malware Analysis: Agent Tesla Part 1/2 Extraction of final payload from dropper.
Agent Tesla