Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-01-24Darren’s WebsiteDarren Martyn
VisualDoor: SonicWall SSL-VPN Exploit
2021-01-24Medium vrieshdVriesHD
Finding SUNBURST victims and targets by using passive DNS, OSINT
SUNBURST
2021-01-24Medium nasbenchNasreddine Bencherchali
Common Tools & Techniques Used By Threat Actors and Malware — Part I
2021-01-24Bleeping ComputerLawrence Abrams
Another ransomware (Avaddon) now uses DDoS attacks to force victims to pay
Avaddon
2021-01-23Youtube (MalwareAnalysisForHedgehogs)Karsten Hahn
Malware Analysis - Fileless GooLoad static analysis and unpacking
2021-01-23vxhive blog0xastrovax
Deep Dive Into SectopRat
SectopRAT
2021-01-23Johannes Bader's BlogJohannes Bader
Yet Another Bazar Loader DGA
BazarBackdoor
2021-01-23NCC GroupNCC RIFT
RIFT: Analysing a Lazarus Shellcode Execution Method
2021-01-22Quick HealDigvijay Mane
Stay Alert, Joker still making its way on Google Play Store!
Joker
2021-01-22360 netlabJinye
Necro is going to version 3 and using PyInstaller and DGA
N3Cr0m0rPh
2021-01-22Twitter (@bryceabdo)Bryce
Tweet on GRIMAGENT malware used by UNC1878 during some #RYUK intrusions in 2020
GRIMAGENT
2021-01-22Trimarc SecurityScott W Blake
LDAP Channel Binding and Signing
2021-01-22Github (Finch4)Finch
Malware Analysis Report No2
BitRAT
2021-01-22ZscalerThreatLabZ research team
DreamBus Botnet - Technical Analysis
2021-01-22InfoSec Handlers Diary BlogXavier Mertens
Another File Extension to Block in your MTA: .jnlp
2021-01-22DomainToolsJoe Slowik
Change in Perspective on the Utility of SUNBURST-related Network Indicators
SUNBURST
2021-01-22SymantecThreat Hunter Team
SolarWinds: How Sunburst Sends Data Back to the Attackers
SUNBURST
2021-01-21NetbyteSECFareed Fauzi
Solarwinds Attack: Sunburst's DLL Technical Analysis
SUNBURST
2021-01-21DENEXUSMarkel Picado
Spear Phishing Targeting ICS Supply Chain - Analysis
Agent Tesla
2021-01-21Medium CSIS TechblogSøren Fritzbøger
Silencing Microsoft Defender for Endpoint using firewall rules