Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-10-23ReutersChristopher Bing
Exclusive: National Guard called in to thwart cyberattack in Louisiana weeks before election
KimJongRat
2020-10-23Bleeping ComputerLawrence Abrams
New RAT malware gets commands via Discord, has ransomware feature
Abaddon
2020-10-23ReutersChristopher Bing, Jack Stubbs
Exclusive: 'Dumb mistake' exposed Iranian hand behind fake Proud Boys U.S. election emails - sources
2020-10-23U.S. Department of the TreasuryU.S. Department of the Treasury
Treasury Sanctions Russian Government Research Institution Connected to the Triton Malware
Triton
2020-10-23F-Secure LabsGuillaume Couchard, Qimin Wang, Thiam Loong Siew
Catching Lazarus: Threat Intelligence to Real Detection Logic - Part Two
MimiKatz
2020-10-23360360 Threat Intelligence Center
APT28携小众压缩包诱饵对北约、中亚目标的定向攻击分析
Zebrocy
2020-10-22BellingcatBellingcat Investigation Team
Russian Vehicle Registration Leak Reveals Additional GRU Hackers
2020-10-22Kaspersky LabsAnton Kuzmenko
On the trail of the XMRig miner
2020-10-22U.S. Department of the TreasuryU.S. Department of the Treasury
Treasury Sanctions Iranian Entities for Attempted Election Interference
2020-10-22Bleeping ComputerLawrence Abrams
French IT giant Sopra Steria hit by Ryuk ransomware
Ryuk
2020-10-22Sentinel LABSMarco Figueroa
An Inside Look at How Ryuk Evolved Its Encryption and Evasion Techniques
Ryuk
2020-10-22ZDNetCatalin Cimpanu
EU sanctions Russia over 2015 German Parliament hack
2020-10-22US-CERTUS-CERT
Alert (AA20-296B): Iranian Advanced Persistent Threat Actors Threaten Election-Related Systems
2020-10-22US-CERTUS-CERT
Alert (AA20-296A): Russian State-Sponsored Advanced Persistent Threat Actor Compromises U.S. Government Targets
2020-10-21G DataKarsten Hahn
T-RAT 2.0: Malware control via smartphone
T-RAT 2.0
2020-10-21AlyacAlyac
ZLoader 악성코드, 사업 정지 경고로 위장해 유포중
Zloader
2020-10-21ProofpointCory Altheide, DAnon, Proofpoint Threat Research Team, Sam S.
Media Coverage Doesn’t Deter Actor From Threatening Democratic Voters
2020-10-21SophosLabs UncutSean Gallagher
LockBit uses automated attack tools to identify tasty targets
LockBit
2020-10-21CyberScoopSean Lyngaas
'MuddyWater' spies suspected in attacks against Middle East governments, telecoms
PowGoop
2020-10-21SymantecThreat Hunter Team
Seedworm: Iran-Linked Group Continues to Target Organizations in the Middle East
PowGoop