Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-04-18MorphisecArnold Osipov, Michael Dereviashkin
What Makes Invalid Printer Loader So Stealthy?
Aurora
2023-04-18Check Point ResearchShavit Yosef
Raspberry Robin: Anti-Evasion How-To & Exploit Analysis
Raspberry Robin
2023-04-18MicrosoftMicrosoft Threat Intelligence
Nation-state threat actor PHOSPHORUS refines tradecraft to attack high-value targets
Drokbk
2023-04-18Cisco TalosMatthew Olney
State-sponsored campaigns target global network infrastructure
2023-04-18NCSC UKCISA, FBI, NCSC UK, NSA
APT28 exploits known vulnerability to carry out reconnaissance and deploy malware on Cisco routers
2023-04-18NCSC UKUnited Kingdom’s National Cyber Security Centre (NCSC-UK)
Jaguar Tooth - Cisco IOS malware that collects device information and enables backdoor access
2023-04-18ZscalerMeghraj Nandanwar, Shatak Jain
Introducing DevOpt: A Multifunctional Backdoor Arsenal
DevOpt
2023-04-18CheckpointShavit Yosef
Raspberry Robin: Anti-Evasion How-To & Exploit Analysis
Raspberry Robin
2023-04-18Twitter (@threatinsight)Threat Insight
Tweet on TA581 using Keitaro TDS URL to download a .MSI file to deliver BumbleBee malware
BumbleBee
2023-04-18MandiantMandiant
M-Trends 2023
QUIETEXIT AppleJeus Black Basta BlackCat CaddyWiper Cobalt Strike Dharma HermeticWiper Hive INDUSTROYER2 Ladon LockBit Meterpreter PartyTicket PlugX QakBot REvil Royal Ransom SystemBC WhisperGate
2023-04-18CitizenLabBahr Abdul Razzak, Bill Marczak, John Scott-Railton, Ron Deibert
Triple Threat: NSO Group’s Pegasus Spyware Returns in 2022 with a Trio of iOS 15 and iOS 16 Zero-Click Exploit Chains
2023-04-18MicrosoftDaniel Simpson, Dianne Gali, Stacyrch140
How Microsoft names threat actors
2023-04-17Medium (@lcam)Luca Mella
Data Insights from Russian Cyber Militants: NoName05716
Dosia
2023-04-17AhnLabASEC
8220 Gang Uses Log4Shell Vulnerability to Install CoinMiner
Water Sigbin
2023-04-17AhnLabASEC
Trigona Ransomware Attacking MS-SQL Servers
Trigona
2023-04-17BE42LATEB42 Labs
Noname057(16) Attack Tracker
Dosia
2023-04-17JUMPSEC LABSmax corbridge
Butting Heads with a Threat Actor on an Engagement
2023-04-17Leandro's blogLeandro Froes
An in-depth look at the Golang Windows calls
2023-04-16BotconfSuweera De Souza
Tracking Bumblebee’s Development
BumbleBee
2023-04-16cocomelonccocomelonc
Malware AV/VM evasion - part 15: WinAPI GetProcAddress implementation. Simple C++ example.