Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-12-13FireEyeAlex Berry, Alex Pennino, Alyssa Rahman, Andrew Archer, Andrew Rector, Andrew Thompson, Barry Vengerik, Ben Read, Ben Withnell, Chris DiGiamo, Christopher Glyer, Dan Perez, Dileep Jallepalli, Doug Bienstock, Eric Scales, Evan Reese, Fred House, Glenn Edwards, Ian Ahl, Isif Ibrahima, Jay Smith, John Gorman, John Hultquist, Jon Leathery, Lennard Galang, Marcin Siedlarz, Matt Dunwoody, Matthew McWhirt, Michael Sikorski, Microsoft, Mike Burns, Nalani Fraiser, Nick Bennett, Nick Carr, Nick Hornick, Nick Richard, Nicole Oppenheim, Omer Baig, Ramin Nafisi, Sarah Jones, Scott Runnels, Stephen Eckels, Steve Miller, Steve Stone, William Ballenthin
Highly Evasive Attacker Leverages SolarWinds Supply Chain to Compromise Multiple Global Victims With SUNBURST Backdoor
SUNBURST SUPERNOVA TEARDROP UNC2452
2020-12-13ReutersChristopher Bing
Suspected Russian hackers spied on U.S. Treasury emails - sources
2020-12-09Palo Alto Networks Unit 42Chris Navarrete, Haozhe Zhang, Yanhui Jia
njRAT Spreading Through Active Pastebin Command and Control Tunnel
NjRAT
2020-12-04IndeChris Campbell
Inside a .NET Stealer: AgentTesla
Agent Tesla
2020-11-10laceworkChris Hall
Meet Muhstik – IoT Botnet Infecting Cloud Servers
Tsunami
2020-11-05McAfeeChristiaan Beek, Ryan Sherstobitoff
Operation North Star: Behind The Scenes
NedDnLoader Torisma
2020-11-01AppRiverChris Lee
Vjw0rm Is Back With New Tactics
Vjw0rm
2020-10-30ReutersChristopher Bing, Joel Schectman, Raphael Satter
Russian hackers targeted California, Indiana Democratic parties
2020-10-29ReutersChristopher Bing, Joseph Menn
Building wave of ransomware attacks strike U.S. hospitals
Ryuk
2020-10-23ReutersChristopher Bing
Exclusive: National Guard called in to thwart cyberattack in Louisiana weeks before election
KimJongRat
2020-10-23ReutersChristopher Bing, Jack Stubbs
Exclusive: 'Dumb mistake' exposed Iranian hand behind fake Proud Boys U.S. election emails - sources
2020-10-15laceworkChris Hall
Moobot's Cloud Migration
2020-10-07Github (brompwnie)Chris Le Roy
Break out the Box (BOtB)
Break out the Box
2020-09-29Cisco TalosChris Neal
LodaRAT Update: Alive and Well
Loda
2020-08-31IndeChris Campbell
Analysis of the latest wave of Emotet malicious documents
Emotet
2020-08-17Cado SecurityChris Doman
Team TNT – The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT TeamTNT
2020-08-17Cado SecurityChris Doman, James Campbell
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT
2020-07-14International Journal of Intelligence and Counter IntelligenceChristian Doerr, Kris Oosthoek
Cyber Threat Intelligence: A Product Without aProcess?
2020-07-10ReversingLabsChristiaan Beek, Cooper Quintin, Hilko Bengen, Jo Johnson, Tom Ueltschi, Tomislav Pericin, Vitali Kremez, Wyatt Roersma
YARA Rules talks and presentation of REVERSING 2020
2020-07-01LookoutApurva Kumar, Christoph Hebeisen, Kristin Del Rosso
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs