Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-29AquasecAssaf Morag
@online{morag:20220329:threat:e86f441, author = {Assaf Morag}, title = {{Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks}}, date = {2022-03-29}, organization = {Aquasec}, url = {https://blog.aquasec.com/python-ransomware-jupyter-notebook}, language = {English}, urldate = {2022-04-05} } Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks
2021-12-29AquaNitzan Yaakov
@online{yaakov:20211229:threat:358d40a, author = {Nitzan Yaakov}, title = {{Threat Alert: Evolving Attack Techniques of Autom Cryptomining Campaign}}, date = {2021-12-29}, organization = {Aqua}, url = {https://blog.aquasec.com/attack-techniques-autom-cryptomining-campaign}, language = {English}, urldate = {2021-12-31} } Threat Alert: Evolving Attack Techniques of Autom Cryptomining Campaign
2021-12-29CrowdStrikeBenjamin Wiley, Falcon OverWatch Team
@online{wiley:20211229:overwatch:35d7dee, author = {Benjamin Wiley and Falcon OverWatch Team}, title = {{OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt}}, date = {2021-12-29}, organization = {CrowdStrike}, url = {https://www.crowdstrike.com/blog/overwatch-exposes-aquatic-panda-in-possession-of-log-4-shell-exploit-tools/}, language = {English}, urldate = {2021-12-31} } OverWatch Exposes AQUATIC PANDA in Possession of Log4Shell Exploit Tools During Hands-on Intrusion Attempt
Cobalt Strike AQUATIC PANDA
2021-11-25DSIHCharles Blanc-Rolin
@online{blancrolin:20211125:emotet:b02b32b, author = {Charles Blanc-Rolin}, title = {{Emotet de retour, POC Exchange, 0-day Windows : à quelle sauce les attaquants prévoient de nous manger cette semaine?}}, date = {2021-11-25}, organization = {DSIH}, url = {https://www.dsih.fr/article/4483/emotet-de-retour-poc-exchange-0-day-windows-a-quelle-sauce-les-attaquants-prevoient-de-nous-manger-cette-semaine.html}, language = {French}, urldate = {2021-12-06} } Emotet de retour, POC Exchange, 0-day Windows : à quelle sauce les attaquants prévoient de nous manger cette semaine?
Emotet
2021-06-22AquaTEAM Nautilus
@techreport{nautilus:20210622:attacks:c19add6, author = {TEAM Nautilus}, title = {{Attacks in the Wild on the Container Supply Chain and Infrastructure}}, date = {2021-06-22}, institution = {Aqua}, url = {https://info.aquasec.com/hubfs/Threat%20reports/AquaSecurity_Cloud_Native_Threat_Report_2021.pdf}, language = {English}, urldate = {2021-06-23} } Attacks in the Wild on the Container Supply Chain and Infrastructure
2021-02-17AquasecAssaf Morag
@online{morag:20210217:threat:b99a6f4, author = {Assaf Morag}, title = {{Threat Alert: TeamTNT Pwn Campaign Against Docker and K8s Environments}}, date = {2021-02-17}, organization = {Aquasec}, url = {https://blog.aquasec.com/teamtnt-campaign-against-docker-kubernetes-environment}, language = {English}, urldate = {2021-02-20} } Threat Alert: TeamTNT Pwn Campaign Against Docker and K8s Environments
TeamTNT TeamTNT
2020-12-02AquaIdan Revivo, Assaf Morag
@online{revivo:20201202:threat:7bb189a, author = {Idan Revivo and Assaf Morag}, title = {{Threat Alert: Fileless Malware Executing in Containers}}, date = {2020-12-02}, organization = {Aqua}, url = {https://blog.aquasec.com/fileless-malware-container-security}, language = {English}, urldate = {2020-12-08} } Threat Alert: Fileless Malware Executing in Containers
Tsunami
2020-12FREE RUSSIA FOUNDATIONMichael Weiss, Catherine A. Fitzpatrick
@techreport{weiss:202012:aquarium:79152c7, author = {Michael Weiss and Catherine A. Fitzpatrick}, title = {{Aquarium Leaks. Inside the GRU’S Psychological Warfare Program}}, date = {2020-12}, institution = {FREE RUSSIA FOUNDATION}, url = {https://www.4freerussia.org/wp-content/uploads/sites/3/2020/12/AquariumLeaks-EN-Web-1.pdf}, language = {English}, urldate = {2020-12-14} } Aquarium Leaks. Inside the GRU’S Psychological Warfare Program
2020-08-17AquaYaniv Agman
@online{agman:20200817:uncover:948e868, author = {Yaniv Agman}, title = {{Uncover Malware Payload Executions Automatically with Tracee}}, date = {2020-08-17}, organization = {Aqua}, url = {https://blog.aquasec.com/ebpf-container-tracing-malware-detection}, language = {English}, urldate = {2020-08-21} } Uncover Malware Payload Executions Automatically with Tracee
2020-04-03AquaGal Singer
@online{singer:20200403:kinsing:e67c720, author = {Gal Singer}, title = {{Kinsing Malware Attacks Targeting Container Environments}}, date = {2020-04-03}, organization = {Aqua}, url = {https://blog.aquasec.com/threat-alert-kinsing-malware-container-vulnerability}, language = {English}, urldate = {2020-04-13} } Kinsing Malware Attacks Targeting Container Environments
Kinsing
2014-09-05GoogleNeel Mehta, Billy Leonard, Shane Huntiey
@techreport{mehta:20140905:peering:8ce5720, author = {Neel Mehta and Billy Leonard and Shane Huntiey}, title = {{Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family}}, date = {2014-09-05}, institution = {Google}, url = {https://assets.documentcloud.org/documents/3461560/Google-Aquarium-Clean.pdf}, language = {English}, urldate = {2020-07-30} } Peering Into the Aquarium: Analysis of a Sophisticated Multi-Stage Malware Family
X-Agent