Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-19PT SWARMArseniy Sharoglazov
Performing Kerberoasting without SPNs
2020-08-19Github (lgandx)Laurent Gaffie
Responder/MultiRelay
Responder
2020-08-19IntezerAvigayil Mechtinger
ELF Malware Analysis 101 Part 2: Initial Analysis
2020-08-18CUJOAI0xffff0800, Albert Zsigovits, Alexey Vishnyakov
UPX Anti-Unpacking Techniques in IoT Malware
Mozi
2020-08-18ID RansomwareAndrew Ivanov
ThunderX Ransomware
ThunderX
2020-08-18F-SecureF-Secure Threat Intelligence Team
Lazarus Group Campaign Targeting the Cryptocurrency Vertical
2020-08-18F-Secure LabsF-Secure Labs
Lazarus Group: Campaign Targeting the Cryptocurrency Vertical
2020-08-18AreteArete Incident Response
Is Conti the New Ryuk?
Conti Ryuk
2020-08-18Menlo SecurityKrishnan Subramanian
New Attack Alert: Duri
2020-08-18Medium mariohenkelMario Henkel
Decrypt MassLogger 2.4.0.0 configuration
MASS Logger
2020-08-17Cado SecurityChris Doman
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT TeamTNT
2020-08-17Twitter (@Arkbird_SOLG)Arkbird
Short twitter thread with analysis on Loup ATM malware
Loup
2020-08-17AquaYaniv Agman
Uncover Malware Payload Executions Automatically with Tracee
2020-08-17PWCPWC UK
WellMess malware: analysis of its Command and Control (C2) server
elf.wellmess
2020-08-17Cado SecurityChris Doman, James Campbell
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT
2020-08-17Twitter (@r3c0nst)Frank Boldewin
Tweet on Loup
Loup
2020-08-16Hatena Blog谷川哲司
WastedLocker IoC collection
WastedLocker
2020-08-16kienmanowar Blogm4n0w4r
Manual Unpacking IcedID Write-up
IcedID
2020-08-15Twitter (@Int2e_)Adrien B
Tweet on DoubleFantasy
DoubleFantasy
2020-08-14NSANSA
Drovorub Malware: Fact Sheet & FAQs