Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-06-15PARAFLAREDaniel Eden
A Defender's Perspective of SSL VPN Exploitation
2021-06-15ID RansomwareAndrew Ivanov
TargetCompany Ransomware
TargetCompany
2021-06-15Perception PointShai Golderman
Insights Into an Excel 4.0 Macro Attack using Qakbot Malware
QakBot
2021-06-15The RecordCatalin Cimpanu
Source code for Paradise ransomware leaked on hacking forums
Paradise
2021-06-15ICRCICRC
Avoiding Civilian Harm from Military Cyber Operations during Armed Conflicts
2021-06-15ViceJoseph Cox
Ransomware Gang Turns to Revenge Porn
2021-06-15TenableDerek Melber
How to Protect Active Directory Against Ransomware Attacks
2021-06-15360 Threat Intelligence Center360 Fiberhome Laboratory
PJobRAT: Spyware targeting Indian military personnel
PjobRAT
2021-06-15Trend MicroByron Gelera, Earle Earnshaw, Janus Agcaoili, Miguel Ang, Nikko Tamana
Ransomware Double Extortion and Beyond: REvil, Clop, and Conti
Clop Conti REvil
2021-06-15Nextron SystemsNextron Systems
Use YARA math Module Extension in THOR TechPreview and THOR Lite
2021-06-15ElasticGabriel Landau
What you need to know about Process Ghosting, a new executable image tampering attack
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades
2021-06-15NCC GroupMichael Matthews, NCC RIFT, William Backhouse
Handy guide to a new Fivehands ransomware variant
FiveHands
2021-06-14Marco Ramilli's BlogMarco Ramilli
The Allegedly Ryuk Ransomware builder: #RyukJoke
Chaos
2021-06-14CYBER GEEKS All Things InfosecCyberMasterV
A Step-by-Step Analysis of a New Version of DarkSide Ransomware
DarkSide
2021-06-14scotthelme.co.ukScott Helme
Introducing Script Watch: Detect Magecart style attacks, fast!
magecart
2021-06-14The RecordCatalin Cimpanu
G7 calls on Russia to crack down on ransomware gangs
2021-06-14nccgroupFox-IT Data Science Team, NCCGroup
Incremental Machine Learning by Example: Detecting Suspicious Activity with Zeek Data Streams, River, and JA3 Hashes
2021-06-14AlienVaultFernando Martinez
Malware hosting domain Cyberium fanning out Mirai variants
Mirai
2021-06-14Blaze's Security BlogBartBlaze
Digital artists targeted in RedLine infostealer campaign
RedLine Stealer