Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-12Max Kersten's BlogMax Kersten
Ghidra script to handle stack strings
CaddyWiper PlugX
2022-04-12Twitter (@apt773)Section 773
Tween on Lapsus$ (UNC3661) Attack chain of compromise via Sitel (Okta subprocessor)'s systems
2022-04-12360 Threat Intelligence Center360 Beacon Lab
Recent attacks by Bahamut group revealed
Bahamut
2022-04-12SophosAndrew Brandt, Angela Gunn, Ferenc László Nagy, Johnathan Fern, Linda Smith, Matthew Everts, Mauricio Valdivieso, Melissa Kelly, Peter Mackenzie, Sergio Bestulic
Attackers linger on government agency computers before deploying Lockbit ransomware
LockBit
2022-04-12AhnLabASEC Analysis Team
SystemBC Being Used by Various Attackers
Emotet SmokeLoader SystemBC
2022-04-11Qianxin Threat Intelligence CenterRed Raindrop Team
Snow Abuse: Analysis of the Suspected Lazarus Attack Activities against South Korean Companies
2022-04-11The Hacker NewsRavie Lakshmanan
Researchers warn of FFDroider and Lightning info-stealers targeting users in the wild
FFDroider
2022-04-11Bleeping ComputerSergiu Gatlan
CISA warns orgs of WatchGuard bug exploited by Russian state hackers
CyclopsBlink
2022-04-09Bleeping ComputerLawrence Abrams
Hackers use Conti's leaked ransomware to attack Russian companies
Conti
2022-04-09HackMD.io (@antoinenguyen09)HoangNCH
Method of analyzing and unpacking compressed PE (Portable Executable) files
2022-04-08GIACGreg Hartrell
Get a handle on cd00r: The invisible backdoor
cd00r
2022-04-08K7 SecurityVigneshwaran P
CryptoClip Hijacker
CryptoClippy
2022-04-08DataBreaches.netDissent
East Tennessee Children’s Hospital updates information on ransomware incident
Storm-0829
2022-04-08ThreatFabricThreatFabric
Look out for Octo's tentacles! A new on-device fraud Android Banking Trojan with a rich legacy
Coper ExoBot
2022-04-08The Hacker NewsRavie Lakshmanan
Microsoft Obtains Court Order to Take Down Domains Used to Target Ukraine
HilalRAT
2022-04-08Palo Alto Networks Unit 42Inbal Shalev, Irena Damsky, Shimi Cohen
New SolarMarker (Jupyter) Campaign Demonstrates the Malware’s Changing Attack Patterns
solarmarker
2022-04-08The Hacker NewsRavie Lakshmanan
Hackers Exploiting Spring4Shell Vulnerability to Deploy Mirai Botnet Malware
Mirai
2022-04-08The Hacker NewsRavie Lakshmanan
Researchers Connect BlackCat Ransomware with Past BlackMatter Malware Activity
BlackCat BlackMatter BlackCat BlackMatter
2022-04-08The RegisterLaura Dobberstein
China accused of cyberattacks on Indian power grid
ShadowPad
2022-04-08Infinitum LabsArda Büyükkaya
Threat Spotlight: Conti Ransomware Group Behind the Karakurt Hacking Team
Cobalt Strike MimiKatz