Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-08-17Cado SecurityChris Doman, James Campbell
Team TNT - The First Crypto-Mining Worm to Steal AWS Credentials
TeamTNT
2020-07-14International Journal of Intelligence and Counter IntelligenceChristian Doerr, Kris Oosthoek
Cyber Threat Intelligence: A Product Without aProcess?
2020-07-10ReversingLabsChristiaan Beek, Cooper Quintin, Hilko Bengen, Jo Johnson, Tom Ueltschi, Tomislav Pericin, Vitali Kremez, Wyatt Roersma
YARA Rules talks and presentation of REVERSING 2020
2020-07-01LookoutApurva Kumar, Christoph Hebeisen, Kristin Del Rosso
Multiyear Surveillance Campaigns Discovered Targeting Uyghurs
2020-06-30CrowdStrikeChad Hemenway, Chris Cwalina, Josh Burgess, Scot Lippenholz
Playing Chess Against Nation-State and Ransomware Threat Actors
2020-06-24Palo Alto Networks Unit 42Chris Navarrete, Durgesh Sangvikar, Ken Hsu, Zhibin Zhang
Lucifer: New Cryptojacking and DDoS Hybrid Malware Exploiting High and Critical Vulnerabilities to Infect Windows Devices
Lucifer
2020-06-16GraphikaBen Nimmo, C. Shawn Eib, Camille François, Chris Hernon, Lea Ronzaud, Rodrigo Ferreira, Tim Kostelancik
Secondary Infektion
2020-06-11Cado SecurityChris Doman, James Campbell
An Ongoing AWS Phishing Campaign
2020-06-08Christian Haschek's BlogChristian Haschek
The A1 Telekom Austria Hack
2020-06-01LookoutApurva Kumar, Christoph Hebeisen, Kristin Del Rosso
Mobile APT SurveillanceCampaigns Targeting Uyghurs A collection of long-running Android tooling connected to a Chinese mAPT actor
CarbonSteal DoubleAgent GoldenEagle SilkBean
2020-05-16Cado SecurityChris Doman, James Campbell
Recent Attacks Against Supercomputers
Loerbas
2020-05-07The CitizenlabChristopher Parsons, Jedidiah Crandall, Jeffrey Knockel, Lotus Ruan, Ron Deibert, Ruohan Xiong
We Chat, They Watch: How International Users Unwittingly Build up WeChat’s Chinese Censorship Apparatus
2020-05-05BellingcatChristo Grozev
Who Is Dmitry Badin, The GRU Hacker Indicted By Germany Over The Bundestag Hacks?
2020-03-31Cisco TalosChris Neal
Trickbot: A primer
TrickBot
2020-03-25FireEyeChristopher Glyer, Dan Perez, Sarah Jones, Steve Miller
This Is Not a Test: APT41 Initiates Global Intrusion Campaign Using Multiple Exploits
Speculoos Cobalt Strike
2020-03-23ReutersChristopher Bing, Jack Stubbs, Raphael Satter
Exclusive: Elite hackers target WHO as coronavirus cyberattacks spike
DarkHotel
2020-03-02c'tChristian Wölbert
Was Emotet anrichtet – und welche Lehren die Opfer daraus ziehen
Emotet Ryuk
2020-02-20McAfeeChristiaan Beek, Darren Fitzpatrick, Eamonn Ryan
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part II
Cobalt Strike LockerGoga Maze MegaCortex
2020-02-18Personal Blog of Christophe Tafani-DereeperChristophe Tafani-Dereeper
Hidden in PEB Sight: Hiding Windows API Imports With a Custom Loader
2020-02-12McAfeeChristiaan Beek
CSI: Evidence Indicators for Targeted Ransomware Attacks – Part I
FriedEx