Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-23vxhive blog0xastrovax
Deep Dive Into SectopRat
SectopRAT
2021-01-23Johannes Bader's BlogJohannes Bader
Yet Another Bazar Loader DGA
BazarBackdoor
2021-01-23NCC GroupNCC RIFT
RIFT: Analysing a Lazarus Shellcode Execution Method
2021-01-22360 netlabJinye
Necro is going to version 3 and using PyInstaller and DGA
N3Cr0m0rPh
2021-01-22Twitter (@bryceabdo)Bryce
Tweet on GRIMAGENT malware used by UNC1878 during some #RYUK intrusions in 2020
GRIMAGENT
2021-01-22Trimarc SecurityScott W Blake
LDAP Channel Binding and Signing
2021-01-22Github (Finch4)Finch
Malware Analysis Report No2
BitRAT
2021-01-22ZscalerThreatLabZ research team
DreamBus Botnet - Technical Analysis
2021-01-22InfoSec Handlers Diary BlogXavier Mertens
Another File Extension to Block in your MTA: .jnlp
2021-01-22DomainToolsJoe Slowik
Change in Perspective on the Utility of SUNBURST-related Network Indicators
SUNBURST
2021-01-22SymantecThreat Hunter Team
SolarWinds: How Sunburst Sends Data Back to the Attackers
SUNBURST
2021-01-21NetbyteSECFareed Fauzi
Solarwinds Attack: Sunburst's DLL Technical Analysis
SUNBURST
2021-01-21DENEXUSMarkel Picado
Spear Phishing Targeting ICS Supply Chain - Analysis
Agent Tesla
2021-01-21Medium CSIS TechblogSøren Fritzbøger
Silencing Microsoft Defender for Endpoint using firewall rules
2021-01-21360 Threat Intelligence CenterAdvanced Threat Institute
Disclosure of Manling Flower Organization (APT-C-08) using Warzone RAT attack
Ave Maria
2021-01-21NetlabJinye
Necro在频繁升级,新版本开始使用PyInstaller和DGA
N3Cr0m0rPh
2021-01-21Sophos LabsAndrew Brandt, Gabor Szappanos
MrbMiner: Cryptojacking to bypass international sanctions
2021-01-21ESET ResearchESET Research
Vadokrist: A wolf in sheep’s clothing
Vadokrist
2021-01-21InfoSec Handlers Diary BlogXavier Mertens
Powershell Dropping a REvil Ransomware
REvil
2021-01-20Team CymruAndy Kraus
MoqHao Part 1: Identifying Phishing Infrastructure
MoqHao