Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-24Medium s2wlabSeunghoe Kim
Deep Analysis of Raccoon Stealer
Raccoon
2021-05-24MIT Technology ReviewDaniel Golden, Renee Dudley
The Colonial pipeline ransomware hackers had a secret weapon: self-promoting cybersecurity firms
DarkSide DarkSide
2021-05-24Jamf BlogJaron Bradley
Zero-Day TCC bypass discovered in XCSSET malware
XCSSET
2021-05-23Chuongdong blogChuong Dong
MountLocker Ransomware
Mount Locker
2021-05-22Youtube (ACPEnw)YouTube (ACPEnw)
Lessons Learned from a Cyber Attack System Admin Perspective
Ryuk
2021-05-21LACYoshihiro Ishikawa
Targeted attack by 'Cobalt Strike loader' that exploits Microsoft's digital signature-Attacker group APT41
Cobalt Strike DUSTPAN
2021-05-21Twitter (@alberto__segura)Alberto Segura
Tweet on Flubot version 4.2 (p.php variant) with new AES strings encryption
FluBot
2021-05-21blackarrowPablo Ambite
Leveraging Microsoft Teams to persist and cover up Cobalt Strike traffic
Cobalt Strike
2021-05-21НКЦКИ - Главная, Ростелеком-Солар
Research report of the series of attacks on the state authorities of the Russian Federation
Mail-O
2021-05-21The RecordCatalin Cimpanu
FSB NKTsKI: Foreign ‘cyber mercenaries’ breached Russian federal agencies
Mail-O
2021-05-21Bleeping ComputerIonut Ilascu
DarkSide affiliates claim gang's bitcoins in deposit on hacker forum
DarkSide
2021-05-21360 Total Securitykate
DarkSide’s Targeted Ransomware Analysis Report for Critical U.S. Infrastructure
DarkSide
2021-05-20SubexSecureHussain Kathawala
CyberGate Threat Report
CyberGate
2021-05-20CrowdStrikejoshua fraser
Response When Minutes Matter: When Good Tools Are Used for (R)Evil
REvil
2021-05-20FBIFBI
Alert Number CP-000147-MW: Conti Ransomware Attacks Impact Healthcare and First Responder Networks
Conti
2021-05-20Digital ShadowsStefano De Blasi
Ransomware-as-a-Service, Rogue Affiliates, and What’s Next
DarkSide DarkSide REvil
2021-05-20WiredAndy Greenberg
The Full Story of the Stunning RSA Hack Can Finally Be Told
2021-05-20SentinelOneMarco Figueroa
Caught in the Cloud | How a Monero Cryptominer Exploits Docker Containers
2021-05-20MicrosoftMicrosoft 365 Defender Threat Intelligence Team
Phorpiex morphs: How a longstanding botnet persists and thrives in the current threat environment
Phorpiex
2021-05-20laceworkChris Hall, Jared Stroud, Tom Hegel
8220 Gangs Recent use of Custom Miner and Botnet