Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-15MicrosoftMicrosoft Threat Intelligence
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware
DevilsTongue Caramel Tsunami
2021-07-15BrightTALKAriel Jungheit, Kaspersky, Mathieu Gaucheler, Vicente Diaz
Visual investigations - Speed up your IR, Forensic Analysis and Hunting
Tiger RAT
2021-07-15Bleeping ComputerLawrence Abrams
Linux version of HelloKitty ransomware targets VMware ESXi servers
HelloKitty
2021-07-15CybereasonCybereason Nocturnus
cybereason vs. prometheus ransomware
Hakbit Prometheus
2021-07-15DomainToolsChad Anderson
American Rescue Plan Act Lures in the Wild
2021-07-15Kryptos LogicKryptos Logic Vantage Team
Adjusting the Anchor
Anchor
2021-07-15Twitter (@hypen1117)Hypen
Vidar Stealer C&C Server List
Vidar
2021-07-15Twitter (@AffableKraut)Eric Brandel
Tweet on another digital skimmer/magecart script from the "q-logger" threat actor
magecart
2021-07-15Twitter (@ESETresearch)ESET Research
Tweet on FreeBSD targeted with Golang backdoor
2021-07-15AhnLabAhnLab ASEC Analysis Team
APT attack (by Kimsuky) attempt on a specific person using a word document
2021-07-15YouTube ( DuMp-GuY TrIcKsTeR)Jiří Vinopal
Fast API resolving of REvil Ransomware related to Kaseya attack
REvil
2021-07-15CitizenLabBahr Abdul Razzak, Bill Marczak, John Scott-Railton, Kristin Berdan, Ron Deibert
Hooking Candiru Another Mercenary Spyware Vendor Comes into Focus
Chainshot
2021-07-15MicrosoftCristin Goodwin
Fighting cyberweapons built by private businesses
2021-07-15MicrosoftMicrosoft Threat Intelligence Center (MSTIC)
Protecting customers from a private-sector offensive actor using 0-day exploits and DevilsTongue malware
2021-07-15Palo Alto Networks Unit 42Alex Hinchliffe, Quinn Cooke, Robert Falcone
Mespinoza Ransomware Gang Calls Victims “Partners,” Attacks with Gasket, "MagicSocks" Tools
Gasket Mespinoza
2021-07-15Recorded FutureInsikt Group®
Threats to the 2020 Tokyo Olympic Games
2021-07-15ISATom Winston
What is Cyber Threat Intelligence?
2021-07-15ReversingLabsRobert Simmons
Data Exfiltrator - A New Tactic for Ransomware Adversaries
DataExfiltrator
2021-07-15FacebookDavid Agranovich, Mike Dvilyanski
Taking Action Against Hackers in Iran
Liderc SysKit
2021-07-14Intel 471Intel 471
How cybercriminals create turbulence for the transportation industry
Mount Locker Nefilim