Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-22Recorded FutureInsikt Group
RedDelta Targets European Government Organizations and Continues to Iterate Custom PlugX Variant
DOPLUGS RedDelta
2022-12-22Cert-UACert-UA
Cyber ​​attack on DELTA system users using RomCom/FateGrab/StealDeal malware (CERT-UA#5709)
ROMCOM RAT
2022-12-22Sentinel LABSAntonio Cocomazzi
Custom-Branded Ransomware: The Vice Society Group and the Threat of Outsourced Development
Curator PolyVice
2022-12-21TrustwaveWojciech Cieslak
Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT
Ekipa RAT
2022-12-21MicrosoftMicrosoft Security Threat Intelligence
Microsoft research uncovers new Zerobot capabilities
ZeroBot SparkRAT
2022-12-21cocomelonccocomelonc
Malware development tricks: part 25. EnumerateLoadedModules. Simple C++ example.
2022-12-21TrendmicroByron Gelera, Don Ovid Ladores, Ivan Nicole Chavez, Khristian Joseph Morales, Monte de Jesus
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks
Royal Ransom
2022-12-21Group-IBArtem Grischenko
Godfather: A banking Trojan that is impossible to refuse
Godfather
2022-12-20ThreatBookThreatBook
Analysis of APT-C-60 Attack on South Korea
SpyGrace
2022-12-20Palo Alto Networks Unit 42Unit42
Russia’s Trident Ursa (aka Gamaredon APT) Cyber Conflict Operations Unwavering Since Invasion of Ukraine
Unidentified VBS 005 (Telegram Loader)
2022-12-20The RecordAlexander Martin
Russian hackers targeted petroleum refining company in NATO state
2022-12-20K7 SecurityMellvin S
Lazarus APT’s Operation Interception Uses Signed Binary
Interception
2022-12-19CrowdStrikeDonato Onofri, Sarang Sonawane
Malware Analysis: GuLoader Dissection Reveals New Anti-Analysis Techniques and Code Injection Redundancy
CloudEyE
2022-12-16SekoiaJamila B., Threat & Detection Research Team
The DPRK delicate sound of cyber
AppleJeus AppleJeus SnatchCrypto
2022-12-16Carnegie Endowment for International PeaceJon Bateman
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications
2022-12-16TrendmicroDon Ovid Ladores, Ivan Nicole Chavez, Jeffrey Francis Bonaobra, Monte de Jesus, Nathaniel Gregory Ragasa, Nathaniel Morales
Agenda Ransomware Uses Rust to Target More Vital Industries
AgendaCrypt
2022-12-15MicrosoftMicrosoft Threat Intelligence
MCCrash: Cross-platform DDoS botnet targets private Minecraft servers
DEV-1028
2022-12-15EuropolEuropol
Global crackdown against DDoS services shuts down most popular platforms
2022-12-15Check Point ResearchCheck Point Research
Mobile #AlienBot malware starts utilizing an incorporated DGA module
Alien
2022-12-15MandiantMandiant
Trojanized Windows 10 Operating System Installers Targeted Ukrainian Government
Cobalt Strike STOWAWAY