Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2020-06-18MicrosoftMicrosoft Threat Protection Intelligence Team
Inside Microsoft Threat Protection: Mapping attack chains from cloud to endpoint (APT33/HOLMIUM)
POWERTON
2020-06-17Youtube (Red Canary)Red Canary
Threat Detection: Blue Mockingbird
2020-06-16MicrosoftMicrosoft Threat Protection Intelligence Team
Exploiting a crisis: How cybercriminals behaved during the outbreak
2020-06-16IBMIBM Security X-Force® Incident Responseand Intelligence Services (IRIS)
Cloud ThreatLandscape Report 2020
QNAPCrypt RokRAT
2020-06-16PTSecurityPT ESC Threat Intelligence
Cobalt: tactics and tools update
CobInt
2020-06-16IntezerAviygayil Mechtinger
ELF Malware Analysis 101: Linux Threats No Longer an Afterthought
Cloud Snooper Dacls EvilGnome HiddenWasp MESSAGETAP NOTROBIN QNAPCrypt Winnti
2020-06-15VMWare Carbon BlackA C
TAU Threat Analysis: Relations to Hakbit Ransomware
Hakbit
2020-06-15SansecSansec Threat Research Team
Magecart strikes amid Corona lockdown
magecart
2020-06-12ThreatConnectThreatConnect Research Team
Probable Sandworm Infrastructure
Avaddon Emotet Kimsuky
2020-06-11SCYTHEJorge Orchilles
#ThreatThursday - Buhtrap
Buhtrap
2020-06-09Kaspersky LabsCostin Raiu
Looking at Big Threats Using Code Similarity. Part 1
Penquin Turla CCleaner Backdoor EternalPetya Regin WannaCryptor XTunnel
2020-06-09McAfeeAlexandre Mundo
RagnarLocker Ransomware Threatens to Release Confidential Information
RagnarLocker
2020-06-09MicrosoftRob Mead, Tom McElroy
Web shell threat hunting with Azure Sentinel and Microsoft Threat Protection
2020-06-09MalwarebytesThreat Intelligence Team
Honda and Enel impacted by cyber attack suspected to be ransomware
Snake
2020-06-08KELARaveed Laeb
Schrodinger’s Threat – MagBo Adapts Access Control Policies
2020-06-08SentinelOnePhil Stokes
A Guide to macOS Threat Hunting and Incident Response
2020-06-08VMWare Carbon BlackA C
TAU Threat Analysis: Hakbit Ransomware
Hakbit
2020-06-08ProofpointDennis Schwarz, Georgi Mladenov, Michael Raggi, Proofpoint Threat Research Team
TA410: The Group Behind LookBack Attacks Against U.S. Utilities Sector Returns with New Malware
FlowCloud Lookback APT10 TA410
2020-06-05GoogleClement Lecigne, Google Threat Analysis Group
Exploits of a TAG analyst chasing in the wild (slides)
2020-06-05GoogleClement Lecigne, Google Threat Analysis Group
Exploits of a TAG analyst chasing in the wild (video)