Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-12-20IntezerNicole Fishbein, Ryan Robinson
Operation HamsaUpdate: A Sophisticated Campaign Delivering Wipers Puts Israeli Infrastructure at Risk
FlashDevelop Handala Hatef Handala
2023-05-24IntezerNicole Fishbein
CryptoClippy is Evolving to Pilfer Even More Financial Data
CryptoClippy
2022-11-10IntezerNicole Fishbein
How LNK Files Are Abused by Threat Actors
BumbleBee Emotet Mount Locker QakBot
2022-07-06IntezerNicole Fishbein
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow
HiddenWasp OrBit Symbiote
2022-04-04IntezerJoakim Kennedy, Nicole Fishbein
Elephant Framework Delivered in Phishing Attacks Against Ukrainian Organizations
GraphSteel GrimPlant SaintBear
2022-01-11IntezerAvigayil Mechtinger, Nicole Fishbein, Ryan Robinson
New SysJoker Backdoor Targets Windows, Linux, and macOS
SysJoker SysJoker SysJoker
2021-07-07IntezerNicole Fishbein, Ryan Robinson
Global Phishing Campaign Targets Energy Sector and its Suppliers
2021-04-06IntezerNicole Fishbein
Rocke Group Actively Targeting the Cloud: Wants Your SSH Keys
2021-01-13IntezerNicole Fishbein
A Rare Look Inside a Cryptojacking Campaign and its Profit
2020-10-01IntezerAvigayil Mechtinger, Nicole Fishbein
A Storm is Brewing: IPStorm Now Has Linux Malware
IPStorm
2020-09-08IntezerNicole Fishbein
Attackers Abusing Legitimate Cloud Monitoring Tools to Conduct Cyber Attacks
2020-07-28IntezerMichael Kajiloti, Nicole Fishbein
Watch Your Containers: Doki Infecting Docker Servers in the Cloud
Doki