Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-06-12NTT SecurityRintaro Koike
About PowerHarbor, a new malware used by SteelClover
PowerHarbor
2023-06-08AhnLabASEC Analysis Team
Lazarus Group exploiting vulnerabilities in domestic financial security solutions
LazarDoor LazarLoader
2023-06-06Security IntelligenceAgnes Ramos-Beauchamp, Claire Zaboeva, Joshua Chung, Melissa Frydrych
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)
RokRAT
2023-06-01K7 SecurityRahul R
Encrypted Chaos: Analysis of Crytox Ransomware
Crytox
2023-05-30IBM SecurityIBM Security X-Force Team
BlackCat (ALPHV) ransomware levels up for stealth, speed and exfiltration
BlackCat BlackCat
2023-05-16KrebsOnSecurityBrian Krebs
Russian Hacker “Wazawaka” Indicted for Ransomware
Babuk Hive LockBit LockBit Babuk Hive LockBit
2023-05-10K7 SecurityBaran S
spynote
SpyNote
2023-05-10DragosDragos
Deconstructing a Cybersecurity Event
2023-05-09YouTube (Security BSides London)Google, Troy Defty
Detection At Scale
2023-05-04SecurityScorecardVlad Pasca
How to Analyze Java Malware – A Case Study of STRRAT
STRRAT
2023-05-02Trend MicroHara Hiroaki, Ted Lee
Attack on Security Titans: Earth Longzhi Returns With New Tricks
Croxloader SPHijacker Earth Longzhi
2023-04-27ReversingLabsCarolynn van Arsdale
The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries
Zarya
2023-04-25ElasticDaniel Stepanic
Elastic Security Labs discovers the LOBSHOT malware
LOBSHOT
2023-04-21K7 SecuritySudeep Waingankar
MuddyWaters back with DarkBit
DarkBit
2023-04-203CXAgathocles Prodromou
Security Update Thursday 20 April 2023 – Initial Intrusion Vector Found
POOLRAT
2023-04-18KrebsOnSecurityBrian Krebs
Giving a Face to the Malware Proxy Service ‘Faceless’
2023-04-18NCSC UKUnited Kingdom’s National Cyber Security Centre (NCSC-UK)
Jaguar Tooth - Cisco IOS malware that collects device information and enables backdoor access
2023-04-14Security IntelligenceCharlotte Hammond, Ole Villadsen
Ex-Conti and FIN7 Actors Collaborate with New Domino Backdoor
Minodo
2023-04-12GridinsoftGridinsoft Cyber Security
XMRig is one of the most widespread malicious miners, that exploits hardware to mine Monero
xmrig
2023-04-11China Cybersecurity Industry AllianceChina Cybersecurity Industry Alliance
Review of Cyberattacks from US Intelligence Agencies - Based on Global Cybersecurity Communities' Analyses
DuQu Flame Gauss Stuxnet