Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-06-29QianxinRedDrip Team
Global Advanced Persistent Threats (APT) Mid-2020 Report
2020-06-29Objective-SeePatrick Wardle
OSX.EvilQuest Uncovered
EvilQuest
2020-06-29Cisco TalosPaul Rascagnères, Vitor Ventura, Warren Mercer
PROMETHIUM extends global reach with StrongPity3 APT
StrongPity
2020-06-28Twitter (@ccxsaber)z3r0
Tweet on Sample
Unidentified 077 (Lazarus Downloader)
2020-06-28Security-in-BitsSecurity-in-Bits
Interesting tactic by Ratty & Adwind for distribution of JAR appended to signed MSI
AdWind Ratty
2020-06-27kienmanowar Blogm4n0w4r
Quick analysis note about GuLoader (or CloudEyE)
CloudEyE
2020-06-26Atlas CybersecurityAtlas Cybersecurity
CryptoCore – Cryptocurrency Exchanges Under Attack
CageyChameleon
2020-06-26BBCBBC News
Russian hacker group Evil Corp targets US workers at home
WastedLocker Evil Corp
2020-06-26USCFUSCF
Update on IT Security Incident at UCSF
Mailto
2020-06-26ZscalerAvinash Kumar, Uday Pratap Singh
Taurus: The New Stealer in Town
Taurus Stealer
2020-06-26Github (Bleeping)Lawrence Abrams
Ransom .exx notes
RansomEXX
2020-06-26BleepingComputerLawrence Abrams
New Ransom X Ransomware used in Texas TxDOT cyberattack
RansomEXX
2020-06-26Twitter (@luc4m)lc4m
Tweet on LALALA stealer and how its name was chosen
LALALA Stealer
2020-06-26Trend MicroJoseph C Chen
US Local Government Services Targeted by New Magecart Credit Card Skimming Attack
magecart
2020-06-26BleepingComputerSergiu Gatlan
Admin of carding portal behind $568M in losses pleads guilty
2020-06-26Department of JusticeDepartment of Justice
Russian National (Aleksei Burkov, Cardplanet) Sentenced to Prison for Operating Websites Devoted to Fraud and Malicious Cyber Activities
2020-06-26SymantecCritical Attack Discovery and Intelligence Team
WastedLocker: Symantec Identifies Wave of Attacks Against U.S. Organizations
donut_injector WastedLocker
2020-06-25Dr.WebDr.Web
BackDoor.ShadowPad.1
ShadowPad
2020-06-25Github (7h3w4lk3r)The Walker
Github Repository of PYBACK
pyback
2020-06-25ContextisConnor Scott
Zoom In: Emulating 'Exploit Purchase' in Simulated Targeted Attacks