Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-25Lab52Lab52
New tricks of APT29 – update on the CERT.PL report
2023-05-25cybleCyble, Cyble Research Labs
Invicta Stealer Spreading Through Phony GoDaddy Refund Invoices
Invicta Stealer
2023-05-25MandiantCorey Hildebrandt, Daniel Kapellmann Zafra, Keith Lunden, Ken Proska, Nathan Brubaker, Rushikesh Nandedkar
COSMICENERGY: New OT Malware Possibly Related To Russian Emergency Response Exercises
LIGHTWORK PIEHOP
2023-05-24IntezerNicole Fishbein
CryptoClippy is Evolving to Pilfer Even More Financial Data
CryptoClippy
2023-05-24cybleCyble
Notable DDoS Attack Tools and Services Supporting Hacktivist Operations in 2023
UserSec
2023-05-24BushidoToken BlogBushidoToken
Unmasking Ransomware Using Stylometric Analysis: Shadow, 8BASE, Rancoz
8Base
2023-05-24Check Point ResearchJiri Vinopal, Marc Salinas Fernandez
Agrius Deploys MoneyBird in Targeted Attacks against Israeli Organizations
Pink Sandstorm
2023-05-24SecureworksCounter Threat Unit ResearchTeam
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations
Volt Typhoon
2023-05-24MicrosoftMicrosoft Threat Intelligence
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Volt Typhoon
2023-05-24CISACISA
AA23-144a: People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection
2023-05-24ZscalerBrett Stone-Gross, Nikolaos Pantazopoulos
Technical Analysis of Pikabot
Pikabot
2023-05-23AhnLabASEC
DarkCloud Infostealer Being Distributed via Spam Emails
DarkCloud Stealer
2023-05-23Cert-AgIDCert-AgID
Technical analysis and considerations on Strela malware
StrelaStealer
2023-05-23SecplicityRyan Estes
Scratching the Surface of Rhysida Ransomware
Rhysida
2023-05-23Aleksandar Milenkoski
Kimsuky | Ongoing Campaign Using Tailored Reconnaissance Toolkit
RandomQuery
2023-05-23U.S. Department of the TreasuryU.S. Department of the Treasury
Treasury Targets DPRK Malicious Cyber and Illicit IT Worker Activities
2023-05-23loginsoftSaharsh Agrawal
Taming the Storm: Understanding and Mitigating the Consequences of CVE-2023-27350
Clop LockBit Silence
2023-05-23ESET ResearchLukáš Štefanko
Android app breaking bad: From legitimate screen recording to file exfiltration within a year
2023-05-23Kaspersky LabsGiampaolo Dedola
Meet the GoldenJackal APT group. Don’t expect any howls
Jackal GoldenJackal
2023-05-22Cert-UACert-UA
Espionage activity of UAC-0063 against Ukraine, Kazakhstan, Kyrgyzstan, Mongolia, Israel, India (CERT-UA#6549)
UAC-0063