Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-06-15Github (cocomelonc)cocomelonc
Malware analysis report: Babuk ransomware
Babuk
2023-06-15SeqriteSathwik Ram Prakki
Double Action, Triple Infection, and a New RAT: SideCopy’s Persistent Targeting of Indian Defence
Action RAT
2023-06-15SymantecThreat Hunter Team
Shuckworm: Inside Russia’s Relentless Cyber Campaign Against Ukraine
Pteranodon
2023-06-15MandiantAustin Larsen, John Palmisano, John Wolfram, Mathew Potaczek, Matthew McWhirt
Barracuda ESG Zero-Day Vulnerability (CVE-2023-2868) Exploited Globally by Aggressive and Skilled Actor, Suspected Links to China
SALTWATER SEASPY UNC4841
2023-06-15Cado SecurityCado Security
Tracking Diicot: an emerging Romanian threat actor
2023-06-14PICUS SecuritySıla Özeren
Picus Cyber Threat Intelligence Report May 2023: Top 10 MITRE ATT&CK Techniques
Earth Longzhi
2023-06-14VulnCheckJacob Baines
Fake Security Researcher GitHub Repositories Deliver Malicious Implant
TorLoader
2023-06-14CISAANSSI, Australian Cyber Security Centre (ACSC), Bundesamt für Sicherheit in der Informationstechnik (BSI), Canadian Centre for Cyber Security (CCCS), CERT NZ, FBI, MS-ISAC, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC)
Understanding Ransomware Threat Actors: Lockbit
LockBit
2023-06-13TrellixErnesto Fernández Provecho
Skuld: The Infostealer that Speaks Golang
Skuld
2023-06-13Medium BI.ZONEOleg Skulkin
Core Werewolf targets the defense industry and critical infrastructure
Awaken Likho
2023-06-13Outpost24Beatriz Pimenta Klein
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
UAC-0118
2023-06-12SophosKarl Ackerman
Deep dive into the Pikabot cyber threat
Pikabot
2023-06-12Kaspersky LabsSergey Lozhkin
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency
DoubleFinger GreetingGhoul
2023-06-12NTT SecurityRintaro Koike
About PowerHarbor, a new malware used by SteelClover
PowerHarbor
2023-06-09cocomelonccocomelonc
Malware development trick - part 33. Syscalls - part 2. Simple C++ example.
2023-06-09ConnectWiseConnectWise CRU
SmashJacker (ChromeLoader variant)
Choziosi
2023-06-08VMRayPatrick Staubmann
Busy Bees - The Transformation of BumbleBee
BumbleBee Cobalt Strike Conti Meterpreter Sliver
2023-06-08Check Point ResearchCheckpoint Research
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa
Stealth Soldier
2023-06-07darksys0xdarksys0x
Analysis and Reversing of srvnet2.sys
LIONTAIL
2023-06-07cocomelonccocomelonc
Malware development trick - part 32. Syscalls - part 1. Simple C++ example.