Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-12SecurityScorecardRyan Sherstobitoff
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
2024-10-29SecurityScorecardSecurityScorecard STRIKE Team
The Job Offer That Wasn’t: How We Stopped an Espionage Plot
BeaverTail InvisibleFerret
2024-01-11SecurityScorecardSecurityScorecard STRIKE Team
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
2024-01-10SecurityScorecardSTRIKE Team
Volt Typhoon Compromises 30% of Cisco RV320/325 Devices in 37 Days
KV
2023-09-13SecurityScorecardVlad Pasca
A detailed analysis of the Money Message Ransomware
Money Message
2023-07-17SecurityScorecardVlad Pasca
A technical analysis of the Quasar-forked RAT called VoidRAT
VoidRAT
2023-05-04SecurityScorecardVlad Pasca
How to Analyze Java Malware – A Case Study of STRRAT
STRRAT
2023-02-07SecurityScorecardVlad Pasca
A Detailed Analysis of a New Stealer Called Stealerium
Stealerium
2023-01-10SecurityScorecardVlad Pasca
How to Analyze JavaScript Malware – A Case Study of Vjw0rm
Vjw0rm
2022-11-27SecurityScorecardVlad Pasca
A Technical Analysis of Royal Ransomware
Royal Ransom
2022-10-17SecurityScorecardVlad Pasca
A Detailed Analysis of the Gafgyt Malware Targeting IoT Devices
Bashlite
2022-09-27SecurityScorecardVlad Pasca
A Deep Dive Into the APT28’s stealer called CredoMap
CredoMap
2022-09-14SecurityScorecardVlad Pasca
A Detailed Analysis of the Quantum Ransomware
Mount Locker
2022-09-06SecurityScorecardVlad Pasca
TTPs Associated With a New Version of the BlackCat Ransomware
BlackCat
2022-08-31SecurityScorecardAlex Heid, Robert Ames, Ryan Slaney
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies
2022-08-30SecurityScorecardRobert Ames
Brute Force Attempts May Have Preceded Ransomware Attack on School District
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-11SecurityScorecardRobert Ames
The Increase in Ransomware Attacks on Local Governments
BlackCat BlackCat Cobalt Strike LockBit
2022-08-01SecurityScorecardVlad Pasca
A Detailed Analysis of the RedLine Stealer
RedLine Stealer
2022-08-01SecurityScorecardVlad Pasca
A Detailed Analysis of the RedLine Stealer
RedLine Stealer
2022-07-18SecurityScorecardVlad Pasca
A Deep Dive Into ALPHV/BlackCat Ransomware
BlackCat
2022-06-13SecurityScorecardVlad Pasca
A Detailed Analysis Of The Last Version Of REvil Ransomware (Download PDF)
REvil
2022-04-13SecurityScorecardRyan Slaney
Zhadnost strikes again… this time in Finland.
2022-03-10SecurityScorecardRyan Slaney
SecurityScorecard Discovers new botnet, ‘Zhadnost,’ responsible for Ukraine DDoS attacks
2021-06-18SecurityScorecardRyan Sherstobitoff
SecurityScorecard Finds USAID Hack Much Larger Than Initially Thought
Cobalt Strike
2021-05-12SecurityScorecardRyan Sherstobitoff
New Evidence Supports Assessment that DarkSide Likely Responsible for Colonial Pipeline Ransomware Attack; Others Targeted
DarkSide DarkSide