Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-30ESET ResearchESET Research
APT Activity Report T3 2022: Sandworm Deploying its Enhanced Wiper Arsenal
2023-01-30CheckpointArie Olshtein
Following the Scent of TrickGate: 6-Year-Old Packer Used to Deploy the Most Wanted Malware
Agent Tesla Azorult Buer Cerber Cobalt Strike Emotet Formbook HawkEye Keylogger Loki Password Stealer (PWS) Maze NetWire RC Remcos REvil TrickBot
2023-01-29Dark VortexParanoid Ninja
Hiding In PlainSight - Indirect Syscall is Dead! Long Live Custom Call Stacks
Brute Ratel C4
2023-01-29AcronisIlan Duhin
Petya/Not Petya Ransomware Analysis
EternalPetya
2023-01-27cybleThe Cyber Express
Old Bot in New Bottle: Amadey Botnet Back in Action Via Phishing Sites
Amadey
2023-01-27ThorCERTDongwook Kim, Seulgi Lee, Taewoo Lee
TTPs #9: Analyzing Attack Strategies to Monitor Individuals' Daily Lives
Chinotto
2023-01-27Cert-UACert-UA
Cyber attack on the Ukrinform information and communication system
CaddyWiper
2023-01-26US Department of JusticeU.S. Attorney's Office Western District of Washington
Alleged French cybercriminal to appear in Seattle on indictment for conspiracy, computer intrusion, wire fraud and aggravated identity theft
ShinyHunters
2023-01-26GoogleGoogle Threat Analysis Group, Jonas Taege, Zak Butler
Over 50,000 instances of DRAGONBRIDGE activity disrupted in 2022
Dragonbridge
2023-01-26Dark VortexParanoid Ninja
Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing
Brute Ratel C4
2023-01-26MandiantAndy Morales, Govand Sinjari
Welcome to Goot Camp: Tracking the Evolution of GOOTLOADER Operations
GootLoader UNC2565
2023-01-26AcronisIlan Duhin
Unpacking Emotet Malware
Emotet
2023-01-25SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Security Advisory: Python-Based PY#RATION Attack Campaign Leverages Fernet Encryption and Websockets to Avoid Detection
PY#RATION
2023-01-25Quadrant Information SecurityQuadrant Information Security
Technical Analysis: Black Basta Malware Overview
Black Basta Black Basta
2023-01-25ProofpointGreg Lesnewich, Proofpoint Threat Research Team
TA444: The APT Startup Aimed at Acquisition (of Your Funds)
CageyChameleon Lazarus Group TA444
2023-01-24ACSCAustralian Cyber Security Centre (ACSC)
2023-01: ACSC Ransomware Profile - Royal
Royal Ransom
2023-01-24SentinelOneAleksandar Milenkoski
DragonSpark | Attacks Evade Detection with SparkRAT and Golang Source Code Interpretation
SparkRAT DragonSpark
2023-01-24TrellixDaksh Kapur, John Fokker, Robert Venal, Tomer Shloman
Cyberattacks Targeting Ukraine Increase 20-fold at End of 2022 Fueled by Russia-linked Gamaredon Activity
Andromeda Formbook Houdini Remcos
2023-01-24DailySecUGil Min-kwon
[Urgent] A Chinese hacker organization that declared hacking war on Korea..."KISA will hack" notice
2023-01-23zero day initiativeSimon Zuckerbraun
Activation Context Cache Poisoning: Exploiting CSRSS for Privilege Escalation
Denim Tsunami