Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-03WikipediaWikpedia
Wikipedia Page: Maksim Yakubets
Dridex Feodo Evil Corp
2020-10-03Trend MicroCedric Pernet, Daniel Lunghi, Jaromír Hořejší, Kazuki Fujisawa
Earth Akhlut: Exploring the Tools, Tactics, and Procedures of an Advanced Threat Actor Operating a Large Infrastructure
Dexbia TypeHash
2020-10-03Medium vishal_thakurVishal Thakur
Grinju Downloader: Anti-analysis (on steroids) | Part 2
Grinju Downloader
2020-10-03AviraAvira Protection Labs
TA505 targets the Americas in a new campaign
ServHelper
2020-10-02Health Sector Cybersecurity Coordination Center (HC3)Health Sector Cybersecurity Coordination Center (HC3)
Report 202010021600: Recent Bazarloader Use in Ransomware Campaigns
BazarBackdoor Cobalt Strike Ryuk TrickBot
2020-10-02LexfoLexfo
Lockbit analysis
LockBit
2020-10-02Twitter (@craiu)Costin Raiu
Tweet about IAmTheKing / PowerPool actor naming
PowerPool
2020-10-02Check Point ResearchEyal Itkin, Itay Cohen
Graphology of an Exploit – Hunting for exploits by looking for the author’s fingerprints
2020-10-02ESET ResearchMatthieu Faou
XDSpy: Stealing government secrets since 2011
XDSpy XDSpy
2020-10-02AppGateAppGate Labs
Appgate Labs Analyzes New Family Of Ransomware - Egregor
Egregor
2020-10-02KrebsOnSecurityBrian Krebs
Attacks Aimed at Disrupting the Trickbot Botnet
TrickBot
2020-10-02FBIFBI
Alert Number I-100220-PSA: Spoofed Internet Domains and Email Accounts Pose Cyber and Disinformation Risks to Voters
2020-10-01KELAVictoria Kivilevich
To Attack or Not to Attack: Targeting the Healthcare Sector in the Underground Ecosystem
Conti DoppelPaymer Mailto Maze REvil Ryuk SunCrypt
2020-10-01Centre for Cyber SecurityCentre for Cyber Security
The Anatomy of Targeted Ransomware Attacks
2020-10-01SpiderLabs BlogDiana Lopera
Evasive URLs in Spam: Part 2
Loki Password Stealer (PWS)
2020-10-01ESET ResearchESET Research
LATAM financial cybercrime: Competitors‑in‑crime sharing TTPs
Numando
2020-10-01Github (eset)Matthieu Faou
XDSpy Indicators of Compromise
XDSpy XDSpy
2020-10-01CrowdStrikeDylan Barker, Quinten Bowen, Ryan Campbell
Duck Hunting with Falcon Complete: Analyzing a Fowl Banking Trojan, Part 1
QakBot MALLARD SPIDER
2020-10-01BarracudaErez Turjeman
Threat Spotlight: New InterPlanetary Storm variant targeting IoT devices
IPStorm
2020-10-01WiredAndy Greenberg
Russia’s Fancy Bear Hackers Likely Penetrated a US Federal Agency
Cobalt Strike Meterpreter