Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-21Twitter (@alberto__segura)Alberto Segura
Tweet on FluBot Version 4.0
FluBot
2021-04-21PhishLabsJessica Ellis
ZLoader Dominates Email Payloads in Q1
Zloader
2021-04-21Bleeping ComputerLawrence Abrams
Massive Qlocker ransomware attack uses 7zip to encrypt QNAP devices
2021-04-21splunkBill Wright, Dave Herrald, James Brodsky, John Stoner, Kelly Huang, Marcus LaFerrerra, Michael Natkin, Mick Baccio, Ryan Kovar, Shannon Davis, Tamara Chacon
Monitoring Pulse Connect Secure With Splunk (CISA Emergency Directive 21-03)
2021-04-21FacebookDavid Agranovich, Mike Dvilyanski
Taking Action Against Hackers in Palestine
SpyNote Houdini NjRAT
2021-04-21FacebookMichael Flossman, Michael Scott
Technical Paper // Taking Action Against Arid Viper
Viper RAT Micropsia
2021-04-21TalosVanja Svajcer
A year of Fajan evolution and Bloomberg themed campaigns
MASS Logger Nanocore RAT NetWire RC Revenge RAT XpertRAT
2021-04-21Bleeping ComputerLawrence Abrams
Logins for 1.3 million Windows RDP servers collected from hacker market
2021-04-21SophosLabs UncutAnand Aijan, Andrew Brandt, Markel Picado, Michael Wood, Sean Gallagher, Sivagnanam Gn, Suriya Natarajan
Nearly half of malware now use TLS to conceal communications
Agent Tesla Cobalt Strike Dridex SystemBC
2021-04-21Virus BulletinKurt Natvig
Run Your Malicious VBA Macros Anywhere!
2021-04-21ReutersJoseph Menn, Raphael Satter
Codecov hackers breached hundreds of restricted customer sites - sources
2021-04-20Twitter (@iiyonite)Stefan Soesanto
Tweet on Uniti 61419
Tick
2021-04-20Bleeping ComputerLawrence Abrams
Fake Microsoft Store, Spotify sites spread info-stealing malware
Ficker Stealer
2021-04-20Medium PacktPackt
What Is Cyber Threat Intelligence?
2021-04-20xorl %eax, %eaxAnastasios Pingios
Chinese Cyber Operations Groups
2021-04-20ElasticWill Burgess
How attackers abuse Access Token Manipulation (ATT&CK T1134)
2021-04-20Bleeping ComputerSergiu Gatlan
REvil gang tries to extort Apple, threatens to sell stolen blueprints
REvil
2021-04-20Trend MicroTrend Micro
Carbanak and FIN7 Attack Techniques
2021-04-20CISAUS-CERT
Alert (AA21-110A): Exploitation of Pulse Connect Secure Vulnerabilities
2021-04-20360 Threat Intelligence CenterAdvanced Threat Institute
Transparent Tribe uses the new crown vaccine hotspot to analyze the targeted attacks on the Indian medical industry
Crimson RAT