Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-07-03SymantecThreat Hunter Team
Kaseya Ransomware Supply Chain Attack: What You Need To Know
REvil
2021-07-02Rewterz Information SecurityRewterz Information Security
Rewterz Threat Intel – IndigoZebra APT Group Targeting Central Asia – Active IOCs
IndigoZebra
2021-07-02Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Geopolitical nation-state threat actor overview June 2021
2021-07-01Anheng Threat Intelligence CenterAnheng Threat Intelligence Center
Suspected HADES organization launched an attack on Ukraine with military themes
2021-06-24BlackberryThe BlackBerry Research and Intelligence Team
Threat Thursday: Agent Tesla Infostealer
Agent Tesla
2021-06-23SymantecThreat Hunter Team
Ransomware: Growing Number of Attackers Using Virtual Machines
Mount Locker
2021-06-22MaltegoIntel 471, Maltego Team
Chasing DarkSide Affiliates: Identifying Threat Actors Connected to Darkside Ransomware Using Maltego & Intel 471
DarkSide DarkSide
2021-06-22SecureworksCounter Threat Unit ResearchTeam
LV Ransomware
REvil
2021-06-21laceworkTom Hegel
Threat Hunting SSH Keys – Bash Script Feature Pivoting
2021-06-18PRODAFT Threat IntelligencePRODAFT
LockBit RaaS In-Depth Analysis
LockBit
2021-06-16Recorded FutureInsikt Group®
Threat Activity Group RedFoxtrot Linked to China’s PLA Unit 69010; Targets Bordering Asian Countries
Icefog PcShare PlugX Poison Ivy QuickHeal DAGGER PANDA
2021-06-15Silent PushSilent Push
Infra-Tagging -a new tool in Cyber Threat Intelligence
2021-06-15360 Threat Intelligence Center360 Fiberhome Laboratory
PJobRAT: Spyware targeting Indian military personnel
PjobRAT
2021-06-15SecureworksCounter Threat Unit ResearchTeam
Hades Ransomware Operators Use Distinctive Tactics and Infrastructure
Cobalt Strike Hades
2021-06-14MicrosoftMicrosoft 365 Defender Research Team, Microsoft Threat Intelligence Center (MSTIC)
Behind the scenes of business email compromise: Using cross-domain threat data to disrupt a large BEC campaign
2021-06-11TencentThe Tencent Security Threat Intelligence Center
Tencent Security Report: Purple Fox virus maliciously attacks SQL server and spreads like a worm
PurpleFox
2021-06-10splunkSplunk Threat Research Team
Detecting Password Spraying Attacks: Threat Research Release May 2021
2021-06-09ESET ResearchMatthieu Faou, Thomas Dupuy
Gelsemium: When threat actors go gardening
Gelsemium
2021-06-09ESET ResearchMatthieu Faou, Thomas Dupuy
Gelsemium: When threat actors go gardening
Owlproxy
2021-06-05Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Geopolitical nation-state threat actor overview May 2021