Click here to download all references as Bib-File.•
2022-07-08
⋅
Sekoia
⋅
Vice Society: a discreet but steady double extortion ransomware group HelloKitty |
2022-07-07
⋅
cyble
⋅
NoMercy Stealer Adding New Features: New Stealer Rapidly Evolving Into Clipper Malware |
2022-07-05
⋅
cyble
⋅
Lockbit 3.0 – Ransomware Group Launches New Version LockBit |
2022-06-30
⋅
Microsoft
⋅
Using process creation properties to catch evasion techniques |
2022-06-30
⋅
Blackberry
⋅
Threat Thursday: China-Based APT Plays Auto-Updater Card to Deliver WinDealer Malware WinDealer Red Nue |
2022-06-30
⋅
cyble
⋅
PennyWise Stealer: An Evasive Infostealer Leveraging YouTube To Infect Users PennyWise Stealer |
2022-06-30
⋅
Microsoft
⋅
Toll fraud malware: How an Android application can drain your wallet Joker |
2022-06-29
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 2: In-depth analysis Raccoon |
2022-06-29
⋅
Team Cymru
⋅
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities |
2022-06-29
⋅
cyble
⋅
Bahamut Android Malware Returns With New Spying Capabilities Bahamut |
2022-06-28
⋅
Sekoia
⋅
Raccoon Stealer v2 – Part 1: The return of the dead Raccoon |
2022-06-27
⋅
CyberArk
⋅
Inside Matanbuchus: A Quirky Loader Matanbuchus |
2022-06-27
⋅
Blackberry
⋅
Threat Spotlight: Eternity Project MaaS Goes On and On Eternity Stealer |
2022-06-23
⋅
splunk
⋅
Threat Update: Industroyer2 INDUSTROYER2 |
2022-06-23
⋅
cyble
⋅
Matanbuchus Loader Resurfaces Cobalt Strike Matanbuchus |
2022-06-16
⋅
Blackberry
⋅
Threat Thursday: Unique Delivery Method for Snake Keylogger 404 Keylogger |
2022-06-15
⋅
AttackIQ
⋅
Attack Graph Emulating the Conti Ransomware Team’s Behaviors BazarBackdoor Conti TrickBot |
2022-06-13
⋅
Sekoia
⋅
BumbleBee: a new trendy loader for Initial Access Brokers BumbleBee |
2022-06-13
⋅
cyble
⋅
Hydra Android Malware Distributed Via Play Store Hydra |
2022-06-09
⋅
Blackberry
⋅
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat Symbiote |