Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-10-27acsenseBrendon Rod
A Guide to Scattered Spider Data Breaches
POORTRY
2022-09-14CISAAustralian Cyber Security Centre (ACSC), CSE Canada, FBI, NCSC UK, NSA, U.S. Cyber Command, U.S. Department of the Treasury, US-CERT
Alert (AA22-257A): Iranian Islamic Revolutionary Guard Corps-Affiliated Cyber Actors Exploiting Vulnerabilities for Data Extortion and Disk Encryption for Ransom Operations
2021-05-01CSETAnna Puglisi, Emily Weinstein, Ryan Fedasiuk
China’s Foreign Technology Wish List
2021-05-01CSETAnna Puglisi, Emily Weinstein, Ryan Fedasiuk
China’s Foreign Technology Wish List
2021-05-01CSETAnna Puglisi, Emily Weinstein, Ryan Fedasiuk
China’s Foreign Technology Wish List
2021-03-09360 netlabJiaYu
Threat Alert: z0Miner Is Spreading quickly by Exploiting ElasticSearch and Jenkins Vulnerabilities
2018-01-22Security AffairsPierluigi Paganini
Op EvilTraffic CSE CybSec ZLAB Malware Analysis Report – Exclusive, tens of thousands of compromised sites involved in a new massive malvertising campaign
EvilTraffic
2017-08-09CSECSE Canada
Hackers are Humans too
Satellite Turla
2011-01-01Spiegel OnlineCSE Canada
SNOWGLOBE: From Discovery to Attribution
Babar