Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-16Sentinel LABSJim Walter
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI
AsyncRAT LockBit XWorm Nullbulge
2023-12-11Sentinel LABSAleksandar Milenkoski, Bendik Hagen
Sandman APT | China-Based Adversaries Embrace Lua
KEYPLUG LuaDream
2023-10-24Sentinel LABSAleksandar Milenkoski, Tom Hegel
The Israel-Hamas War | Cyber Domain State-Sponsored Activity of Interest
ShroudedSnooper
2023-09-21Sentinel LABSAleksandar Milenkoski, QGroup
Sandman APT | A Mystery Group Targeting Telcos with a LuaJIT Toolkit
LuaDream
2023-09-21Sentinel LABSTom Hegel
Cyber Soft Power | China’s Continental Takeover
Earth Estries
2023-06-06Sentinel LABSAleksandar Milenkoski
Kimsuky Strikes Again: New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence
2023-03-09Sentinel LABSSentinelLabs
IceFire Ransomware Returns | Now Targeting Linux Enterprise Networks
iceFire
2023-01-12Sentinel LABSAleksandar Milenkoski, Tom Hegel
NoName057(16) – The Pro-Russian Hacktivist Group Targeting NATO
Bobik Dosia NoName057(16)
2022-12-22Sentinel LABSAntonio Cocomazzi
Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development
Curator PolyVice
2022-11-03Sentinel LABSAntonio Cocomazzi
Black Basta Ransomware | Attacks Deploy Custom EDR Evasion Tools Tied to FIN7 Threat Actor
Black Basta
2022-09-22Sentinel LABSTom Hegel
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
Void Balaur
2022-09-08Sentinel LABSAleksandar Milenkoski, Jim Walter
Crimeware Trends | Ransomware Developers Turn to Intermittent Encryption to Evade Detection
AgendaCrypt Black Basta BlackCat PLAY
2022-09-01Sentinel LABSAleksandar Milenkoski, Amitai Ben Shushan Ehrlich, Juan Andrés Guerrero-Saade
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
2022-09-01Sentinel LABSAmitai Ben Shushan Ehrlich
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
JuiceLedger
2022-07-21Sentinel LABSAleksandar Milenkoski, Jim Walter
LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques
LockBit
2022-07-07Sentinel LABSTom Hegel
Targets of Interest - Russian Organizations Increasingly Under Attack By Chinese APTs
8.t Dropper Korlia Tonto Team
2022-06-09Sentinel LABSJoey Chen
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
heyoka mongall Aoqin Dragon
2022-05-02Sentinel LABSAmitai Ben Shushan Ehrlich, Joey Chen
Moshen Dragon’s Triad-and-Error Approach | Abusing Security Software to Sideload PlugX and ShadowPad
PlugX ShadowPad Moshen Dragon
2022-04-27Sentinel LABSJames Haughom, Jim Walter, Júlio Dantas
LockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility
Cobalt Strike LockBit BRONZE STARLIGHT
2022-04-27Sentinel LABSJames Haughom, Jim Walter, Júlio Dantas
LockBit Ransomware Side-loads Cobalt Strike Beacon with Legitimate VMware Utility
Cobalt Strike LockBit