Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-04menshaway blogspotMahmoud Morsy
Technical report of AgentTesla
Agent Tesla
2021-04-04@r3dbU7z
Bot. One more. One verdict. Brand New?
kfos
2021-04-03DataBreaches.netDissent
SG: Vhive attackers escalate, take control of furniture retailer’s email server
ALTDOS
2021-04-03Github (carbreal)Carlos Brendel
Hubnr Botnet
Hubnr
2021-04-02NRC HandelsbladCarola Houtekamer, Rik Wassens
The cesspool of the internet is to be found in a village in North Holland
Zeus
2021-04-02MorphisecMichael Gorelik
The “Fair” Upgrade Variant of Phobos Ransomware
Makop Phobos
2021-04-02KasperskyAMR
Browser lockers: extortion disguised as a fine
2021-04-02CISA, FBI
Joint CSA AA21-092A: APT Actors Exploit Vulnerabilitiesto Gain Initial Access for Future Attacks
2021-04-02360 Total Securitykate
A “txt file” can steal all your secrets
Poulight Stealer
2021-04-02Dr.WebDr.Web
Study of targeted attacks on Russian research institutes
Cotx RAT Ghost RAT TA428
2021-04-01AhnLabASEC Analysis Team
ASEC REPORT VOL.102 Q1 2021
ComeBacker JessieConTea LCPDot
2021-04-01CybereasonCybereason Nocturnus
Cybereason vs. DarkSide Ransomware
DarkSide
2021-04-01CISAUS-CERT
Defending Against Software Supply Chain Attacks
2021-04-01humansecurityAdam Sell, Federico Harrington, Gabi Cirlig, Inna Vasilyeva, Michael McNally, Michael Moran, Mikhail Venkov, Vikas Parthasarathy
PARETO: A Technical Analysis
2021-04-01Reversing LabsRobert Simmons
Code Reuse Across Packers and DLL Loaders
IcedID SystemBC
2021-04-01SentinelOneJim Walter
Avaddon RaaS | Breaks Public Decryptor, Continues On Rampage
Avaddon
2021-04-01Palo Alto Networks Unit 42Brad Duncan, Vijay Prakash
Wireshark Tutorial: Decrypting RDP Traffic
2021-04-01Medium mikko-kenttalaMikko Kenttälä
Zero click vulnerability in Apple’s macOS Mail
2021-04-01MicrosoftCole Sodja, Joshua Neil, Justin Carroll, Melissa Turcotte, Microsoft 365 Defender Research Team
Automating threat actor tracking: Understanding attacker behavior for intelligence and contextual alerting
2021-04-01Palo Alto Networks Unit 42Brad Duncan
Hancitor’s Use of Cobalt Strike and a Noisy Network Ping Tool
Cobalt Strike Hancitor Moskalvzapoe