Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-26CISACISA, FBI, Department of Homeland Security
@techreport{cisa:20210426:russian:0ef89c2, author = {CISA and FBI and Department of Homeland Security}, title = {{Russian Foreign Intelligence Service (SVR)Cyber Operations: Trends and Best Practices for Network Defenders}}, date = {2021-04-26}, institution = {CISA}, url = {https://us-cert.cisa.gov/sites/default/files/publications/AA21-116A_Russian_Foreign_Intelligence_Service_Cyber_Operations_508C.pdf}, language = {English}, urldate = {2021-04-29} } Russian Foreign Intelligence Service (SVR)Cyber Operations: Trends and Best Practices for Network Defenders
elf.wellmess WellMess
2021-03-16Department of Homeland SecurityDepartment of Justice, Department of Homeland Security, CISA
@techreport{justice:20210316:foreign:fe59715, author = {Department of Justice and Department of Homeland Security and CISA}, title = {{Foreign Interference Targeting Election Infrastructure or Political Organization, Campaign, or Candidate InfrastructureRelated to the 2020 US Related to the 2020 US Federal Elections}}, date = {2021-03-16}, institution = {Department of Homeland Security}, url = {https://www.dhs.gov/sites/default/files/publications/21_0311_key-findings-and-recommendations-related-to-2020-elections_0.pdf}, language = {English}, urldate = {2021-03-19} } Foreign Interference Targeting Election Infrastructure or Political Organization, Campaign, or Candidate InfrastructureRelated to the 2020 US Related to the 2020 US Federal Elections
2021-01-28Department of Homeland SecurityDepartment of Justice
@online{justice:20210128:emotet:cb82f8e, author = {Department of Justice}, title = {{Emotet Botnet Disrupted in International Cyber Operation}}, date = {2021-01-28}, organization = {Department of Homeland Security}, url = {https://www.justice.gov/opa/pr/emotet-botnet-disrupted-international-cyber-operation}, language = {English}, urldate = {2021-02-01} } Emotet Botnet Disrupted in International Cyber Operation
Emotet
2020-12-13Department of Homeland SecurityDepartment of Homeland Security
@online{security:20201213:mitigate:7a003e3, author = {Department of Homeland Security}, title = {{Mitigate SolarWinds Orion Code Compromise}}, date = {2020-12-13}, organization = {Department of Homeland Security}, url = {https://cyber.dhs.gov/ed/21-01/}, language = {English}, urldate = {2020-12-14} } Mitigate SolarWinds Orion Code Compromise
2020-10-06Department of Homeland SecurityDepartment of Homeland Security
@techreport{security:20201006:homeland:89eacb6, author = {Department of Homeland Security}, title = {{Homeland Threat Assessment October 2020}}, date = {2020-10-06}, institution = {Department of Homeland Security}, url = {https://www.dhs.gov/sites/default/files/publications/2020_10_06_homeland-threat-assessment.pdf}, language = {English}, urldate = {2020-10-12} } Homeland Threat Assessment October 2020
2020-08-14Department of Homeland SecurityUS-CERT
@online{uscert:20200814:alert:d3dbb71, author = {US-CERT}, title = {{Alert (AA20-227A): Phishing Emails Used to Deploy KONNI Malware}}, date = {2020-08-14}, organization = {Department of Homeland Security}, url = {https://us-cert.cisa.gov/ncas/alerts/aa20-227a}, language = {English}, urldate = {2020-08-14} } Alert (AA20-227A): Phishing Emails Used to Deploy KONNI Malware
Konni
2017-11-14Department of Homeland SecurityDepartment of Homeland Security
@online{security:20171114:hidden:a45c30a, author = {Department of Homeland Security}, title = {{HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL}}, date = {2017-11-14}, organization = {Department of Homeland Security}, url = {https://www.us-cert.gov/ncas/alerts/TA17-318A}, language = {English}, urldate = {2019-11-28} } HIDDEN COBRA – North Korean Remote Administration Tool: FALLCHILL
Lazarus Group
2017-02-10Department of Homeland SecurityNational Cybersecurity, Communications Integration Center
@techreport{cybersecurity:20170210:ar1720045:43c91fd, author = {National Cybersecurity and Communications Integration Center}, title = {{AR-17-20045 - Enhanced Analysis of GRIZZLY STEPPE Activity}}, date = {2017-02-10}, institution = {Department of Homeland Security}, url = {https://www.us-cert.gov/sites/default/files/publications/AR-17-20045_Enhanced_Analysis_of_GRIZZLY_STEPPE_Activity.pdf}, language = {English}, urldate = {2019-11-05} } AR-17-20045 - Enhanced Analysis of GRIZZLY STEPPE Activity
APT 29
2016-12-29Department of Homeland SecurityDepartment of Homeland Security
@online{security:20161229:grizzly:e07e4e0, author = {Department of Homeland Security}, title = {{GRIZZLY STEPPE – Russian Malicious Cyber Activity}}, date = {2016-12-29}, organization = {Department of Homeland Security}, url = {https://www.us-cert.gov/security-publications/GRIZZLY-STEPPE-Russian-Malicious-Cyber-Activity}, language = {English}, urldate = {2019-11-21} } GRIZZLY STEPPE – Russian Malicious Cyber Activity
PAS