Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2019-12-05U.S. Department of the TreasuryU.S. Department of the Treasury
Treasury Sanctions Evil Corp, the Russia-Based Cybercriminal Group Behind Dridex Malware
Dridex
2019-12-05Andrew Ivanov
RedRum Ransomware
RedRum
2019-12-05Github (albertzsigovits)Albert Zsigovits
Snatch ransomware
Snatch
2019-12-05Github (blackorbird)blackorbird
APT32 Report
Cobalt Strike
2019-12-05Emerging ThreatsEmerging Threats
Suricata Rules dated 2019-12-05
Unidentified 068
2019-12-05KrabsOnSecurityMr. Krabs
Buer Loader, new Russian loader on the market with interesting persistence
Buer
2019-12-05Github (jeFF0Falltrades)Jeff Archer
PoshC2 (specifically as used by APT33)
PoshC2
2019-12-05Marco Ramilli's BlogMarco Ramilli
APT28 Attacks Evolution
APT28
2019-12-05Raphael Mudge
Cobalt Strike 4.0 – Bring Your Own Weaponization
Cobalt Strike
2019-12-04Kaspersky LabsDavid Emm
APT review: what the world’s threat actors got up to in 2019
ShaggyPanther
2019-12-04Palo Alto Networks Unit 42Robert Falcone
xHunt Campaign: xHunt Actor’s Cheat Sheet
2019-12-04ElasticDavid French
Ransomware, interrupted: Sodinokibi and the supply chain
REvil
2019-12-04JPCERT/CCKen Sajo
How to Respond to Emotet Infection (FAQ)
Emotet
2019-12-04WeixinGcow Security Team
Tentacles reaching Central Asia: analysis of Uzbekistan activities by DustSquad APT
Octopus
2019-12-04ProofpointAxel F, Dennis Schwarz, Kafeine, Kelsey Merriman
Buer, a new loader emerges in the underground marketplace
Buer
2019-12-03Twitter (@bkMSFT)Ben K (bkMSFT)
Tweet on ZIRCONIUM alias for APT31
APT31
2019-12-03NSHCRed Alert
THREAT ACTOR TARGETING HONG KONG PRO-DEMOCRACY FIGURES
APT31
2019-12-03Objective-SeeObjective-See
Lazarus Group Goes 'Fileless'
Unidentified macOS 001 (UnionCryptoTrader)
2019-12-03SecFreaksSecFreaks
In depth analysis of an infostealer: Raccoon
Raccoon
2019-12-03NSHCNSHC Threatrecon Team
Threat Actor Targeting Hong Kong Pro-Democracy Figures
sihost