Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-08ThreatFabricThreatFabric
Look out for Octo's tentacles! A new on-device fraud Android Banking Trojan with a rich legacy
Coper ExoBot
2022-04-08ReversingLabsPaul Roberts
ConversingLabs Ep. 2: Conti pivots as ransomware as a service struggles
Conti Emotet TrickBot
2022-04-07Bleeping ComputerBill Toulas
Malicious web redirect service infects 16,500 sites to push malware
NetSupportManager RAT
2022-04-07DomainToolsDomainTools
SPM55: Ascending the Ranks of Indonesian Phishing As A Service Offerings
2022-03-31CrowdStrikeChristopher Romano, Vaishnav Murthy
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365
2022-03-31CrowdStrikeChristopher Romano, Vaishnav Murthy
Cloudy with a Chance of Unclear Mailbox Sync: CrowdStrike Services Identifies Logging Inconsistencies in Microsoft 365
2022-03-25GOV.UAState Service of Special Communication and Information Protection of Ukraine (CIP)
Who is behind the Cyberattacks on Ukraine's Critical Information Infrastructure: Statistics for March 15-22
Xloader Agent Tesla CaddyWiper Cobalt Strike DoubleZero GraphSteel GrimPlant HeaderTip HermeticWiper IsaacWiper MicroBackdoor Pandora RAT
2022-03-24ESET ResearchLukáš Štefanko
Crypto malware in patched wallets targeting Android and iOS devices
2022-03-18Vice MotherboardJoseph Cox
Open Source Maintainer Sabotages Code to Wipe Russian, Belarusian Computers
PeaceNotWar
2022-03-16CiscoYuri Kramarz
Preparing for denial-of-service attacks with Talos Incident Response
2022-03-16MicrosoftMicrosoft Defender for IoT Research Team, Microsoft Threat Intelligence Center (MSTIC)
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure
TrickBot
2022-03-16MicrosoftMicrosoft Defender for IoT Research Team, Microsoft Threat Intelligence Center (MSTIC)
Uncovering Trickbot’s use of IoT devices in command-and-control infrastructure
TrickBot
2022-02-24RiskIQRiskIQ
RiskIQ: WatchGuard Devices Targeted by Cyclops Blink Malware
2022-02-16Trend MicroFyodor Yarochkin, Paul Pajares, Ryan Flores, Vladimir Kropotov, Zhengyu Dong
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2022-02-16Trend MicroFyodor Yarochkin, Paul Pajares, Ryan Flores, Vladimir Kropotov, Zhengyu Dong
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2022-02-16Trend MicroFyodor Yarochkin, Paul Pajares, Ryan Flores, Vladimir Kropotov, Zhengyu Dong
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2022-02-16Trend MicroFyodor Yarochkin, Paul Pajares, Ryan Flores, Vladimir Kropotov, Zhengyu Dong
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2022-02-16Trend MicroFyodor Yarochkin, Paul Pajares, Ryan Flores, Vladimir Kropotov, Zhengyu Dong
SMS PVA Services' Use of Infected Android Phones Reveals Flaws in SMS Verification
Guerrilla
2022-02-16Välisluureamet Estonian Foreign Intelligence ServiceVälisluureamet Estonian Foreign Intelligence Service
International Security and Estonia 2022
2022-02-150ffset BlogChuong Dong
MATANBUCHUS: Another Loader As A Service Malware
Matanbuchus