Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-02-23TwitterTwitter Safety
Disclosing networks of state-linked information operations
2021-02-22AdvIntelBeatriz Pimenta Klein
Economic Growth, Digital Inclusion, & Specialized Crime: Financial Cyber Fraud in LATAM
BRATA Mekotio Metamorfo Ploutus ATM VictoryGate
2021-02-22Check Point ResearchEyal Itkin, Itay Cohen
The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day
APT31
2021-02-22Avast DecodedAnh ho
MassLogger v3: a .NET stealer with serious obfuscation
MASS Logger
2021-02-22National Security and Defense Council of UkraineOrganization of the National Security and Defense Council of Ukraine
The NCCC at the NSDC of Ukraine warns of a new mechanism of attacks on Ukrainian infrastructure
2021-02-22YouTube ( Malware_Analyzing_&_RE_Tips_Tricks)Jiří Vinopal
Ryuk Ransomware API Resolving in 10 minutes
Ryuk
2021-02-22Check Point ResearchEyal Itkin, Itay Cohen
The Story of Jian – How APT31 Stole and Used an Unknown Equation Group 0-Day
2021-02-22tccontre Blogtcontre
Gh0stRat Anti-Debugging: Nested SEH (try - catch) to Decrypt and Load its Payload
Ghost RAT
2021-02-22FireEyeAndrew Moore, Genevieve Stark, Isif Ibrahima, Kimberly Goody, Van Ta
Cyber Criminals Exploit Accellion FTA for Data Theft and Extortion
DEWMODE Clop
2021-02-21AntiyAntiy CERT
Analysis report on the attack activities of the "Baby Elephant" against Pakistani defense manufacturers
2021-02-20Medium (Nasreddine Bencherchali)Nasreddine Bencherchali
Finding Forensic Goodness In Obscure Windows Event Logs
2021-02-20MalpediaMalpedia
Malpedia Website for Malware Family Team TNT
TeamTNT TeamTNT
2021-02-20NDSSAlessandro Mantovani, Alexander Küchler, Davide Balzarotti, Leyla Bilge, Yufei Han
Does Every Second Count? Time-based Evolution of Malware Behavior in Sandboxes
2021-02-19K7 SecurityPartheeban J
GitHub – Home to AsyncRAT Backdoor
AsyncRAT
2021-02-19Medium 0xthreatintel0xthreatintel
How to unpack SManager APT tool?
SManager
2021-02-19GEMINIGEMINI
Alleged Hydra Market Operators Identified
2021-02-19THE NEW STACKDror Alon, Lior Sonntag
Behind the Scenes of the SunBurst Attack
SUNBURST
2021-02-19Lawfare BlogSonja Swanbeck
How to Understand Iranian Information Operations
2021-02-19The RecordAdam Janofsky, Timo Steffens
Cyber Attribution Is More Art Than Science. This Researcher Has a Plan to Change That
2021-02-19Palo Alto Networks Unit 42Dominik Reichel
IronNetInjector: Turla’s New Malware Loading Tool
Agent.BTZ IronNetInjector TurlaRPC