Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-27Bleeping ComputerSergiu Gatlan
Microsoft links Raspberry Robin worm to Clop ransomware attacks
Clop Raspberry Robin
2022-10-27ANY.RUNANY.RUN
STRRAT: Malware Analysis of a JAR archive
STRRAT
2022-10-25MicrosoftMicrosoft Security Threat Intelligence
DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector
BlackCat Mount Locker PortStarter Zeppelin Vanilla Tempest
2022-10-25Medium walmartglobaltechJason Reaves
Brute Ratel Config Decoding update
Brute Ratel C4
2022-10-25VMware Threat Analysis UnitTakahiro Haruyama
Tracking the entire iceberg: long-term APT malware C2 protocol emulation and scanning
ShadowPad Winnti
2022-10-25U.S. Department of Justice
Newly Unsealed Indictment Charges Ukrainian National with International Cybercrime Operation
Raccoon
2022-10-24Youtube (Virus Bulletin)Google Threat Analysis Group, Luca Nagy
Uncovering a broad criminal ecosystem powered by one of the largest botnets
Glupteba
2022-10-24AhnLabASEC Analysis Team
Malware infection case of Lazarus attack group that neutralizes antivirus program with BYOVD technique
FudModule LazarDoor Racket Downloader
2022-10-23BlackberryThe BlackBerry Research & Intelligence Team
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
ROMCOM RAT RomCom
2022-10-22MicrosoftMicrosoft Security Threat Intelligence
DEV-0952 deploys Daixin ransomware at hospitals
2022-10-21SymantecThreat Hunter Team
Exbyte: BlackByte Ransomware Attackers Deploy New Exfiltration Tool
ExByte
2022-10-20Bleeping ComputerBill Toulas
Hacking group updates Furball Android spyware to evade detection
FurBall
2022-10-18LogpointAnish Bogati, Nilaa Maharjan
Hunting Lockbit Variation
LockBit
2022-10-18IntrinsecCERT Intrinsec, Intrinsec
APT27 – One Year To Exfiltrate Them All: Intrusion In-Depth Analysis
HyperBro MimiKatz
2022-10-17Atlantic CouncilBulelani Jili
China’s surveillance ecosystem and the global spread of its tools
2022-10-17SPURSean S.
I Don’t Like Big Gateways (and I Cannot Lie) - How IP Reputation Gets Large Gateways Wrong
2022-10-17Malversegreenplan
Stack String Decryption with Ghidra Emulator (Orchard)
Orchard
2022-10-14MicrosoftMicrosoft Security Threat Intelligence
New “Prestige” ransomware impacts organizations in Ukraine and Poland
Prestige
2022-10-13SyrionRaffaele Sabato
QAKBOT BB Configuration and C2 IPs List
QakBot
2022-10-13Bleeping ComputerSergiu Gatlan
Trend Micro warns of actively exploited Apex One RCE vulnerability (CVE-2022-40139)