Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-05-18BitdefenderAron Radu, Bogdan Botezatu, George Mihali, Mihai Neagu, Ștefan Trifescu
New WastedLoader Campaign Delivered Through RIG Exploit Kit
WastedLoader WastedLocker
2021-05-05SophosLabs UncutAndrew Brandt, Gabor Szappanos, Peter Mackenzie, Vikas Singh
Intervention halts a ProxyLogon-enabled attack
Cobalt Strike
2021-05-04Lacework LabsChris Hall
Cpuminer & Friends
2021-04-22laceworkChris Hall, Jared Stroud
Sysrv-Hello Expands Infrastructure
Sysrv-hello
2021-04-21SophosLabs UncutAnand Aijan, Andrew Brandt, Markel Picado, Michael Wood, Sean Gallagher, Sivagnanam Gn, Suriya Natarajan
Nearly half of malware now use TLS to conceal communications
Agent Tesla Cobalt Strike Dridex SystemBC
2021-04-15European CouncilCouncil of the European Union
Declaration by the High Representative on behalf of the European Union expressing solidarity with the United States on the impact of the SolarWinds cyber operation
SUNBURST
2021-04-08Palo Alto Networks Unit 42Ashutosh Chitwadgi, Ken Hsu, Vaibhav Singhal
Attackers Conducting Cryptojacking Operation Against U.S. Education Organizations
2021-03-18laceworkChris Hall
The “Kek Security” Network
Kaiten N3Cr0m0rPh
2021-03-17Palo Alto Networks Unit 42Haozhe Zhang, Jun Du, Vaibhav Singhal, Zhibin Zhang
Satori: Mirai Botnet Variant Targeting Vantage Velocity Field Unit RCE Vulnerability
Satori
2021-03-15Palo Alto Networks Unit 42Asher Davila, Ruchna Nigam, Vaibhav Singhal, Zhibin Zhang
New Mirai Variant Targeting New IoT Vulnerabilities, Including in Network Security Devices
Mirai
2021-02-20Medium (Nasreddine Bencherchali)Nasreddine Bencherchali
Finding Forensic Goodness In Obscure Windows Event Logs
2021-02-17US-CERTCISA
Malware Analysis Report (AR21-048G): AppleJeus: Ants2Whale
AppleJeus AppleJeus
2021-02-04HALAimad Berady, Gilles Guette, Mathieu Jaume, Valérie Viet Triem Tong
From TTP to IoC: Advanced Persistent Graphs forThreat Hunting
2021-02-01GoSecureLilly Chalupowski
BazarLoader Mocks Researchers in December 2020 Malspam Campaign
BazarBackdoor
2021-02-01EST SecurityAlyac
Thallium organization conducts elaborate cyber attack against Russian researchers working in the North Korean economyPerforming sophisticated cyber attacks against researchers
2021-01-27laceworkChris Hall
Groundhog Botnet Rapidly Infecting Cloud
XOR DDoS
2021-01-25Trend MicroFyodor Yarochkin, Loseway Lu, Marshall Chen, Matsukawa Bakuei, Vladimir Kropotov
Fake Office 365 Used for Phishing Attacks on C-Suite Targets
2021-01-24Medium nasbenchNasreddine Bencherchali
Common Tools & Techniques Used By Threat Actors and Malware — Part I
2021-01-18ArxivDaniele Sgandurra, Jason Gray, Lorenzo Cavallaro
Identifying Authorship Style in Malicious Binaries: Techniques, Challenges & Datasets
2021-01-03EST SecurityAlyac
Thallium organization exploits private stock investment messenger to attack software supply chain