Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-07Cert-UACert-UA
UAC-0057 Targeted Cyber ​​Attack Against Government Agencies Using PicassoLoader/njRAT (CERT-UA#6948)
PicassoLoader Ghostwriter
2023-07-07Medium cryptaxAxelle Apvrille
Eyes on Android/S.O.V.A botnet sample
S.O.V.A.
2023-07-07Rapid7 LabsCaitlin Condon
Exploitation of Mitel MiVoice Connect SA CVE-2022-29499
2023-07-07ZscalerNiraj Shivtarkar, Preet Kamal
The TOITOIN Trojan: Analyzing a New Multi-Stage Attack Targeting LATAM Region
2023-07-07Lab52Lab52
Beyond appearances: unknown actor using APT29’s TTP against Chinese users
Cobalt Strike
2023-07-07Github (cocomelonc)cocomelonc
Malware development trick - part 34: Find PID via WTSEnumerateProcesses. Simple C++ example.
2023-07-06MicrosoftMicrosoft Incident Response
The five-day job: A BlackByte ransomware intrusion case study
BlackByte ExByte
2023-07-06kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] Examining Formbook Campaign via Phishing Emails
Formbook
2023-07-06Github (Helixo32)Helixo32
NimBlackout
NimBlackout
2023-07-06WeLiveSecurityJakub Kaloč
What’s up with Emotet?
Emotet
2023-07-06CISACISA
Increased Truebot Activity Infects U.S. and Canada Based Networks
Silence
2023-07-05Aqua NautilusAssaf Morag, Ofek Itach
Threat Alert: Anatomy of Silentbob’s Cloud Attack
TeamTNT Tsunami
2023-07-05QianxinRed Raindrop Team
Patchwork Group Utilizing WarHawk Backdoor Variant "Spyder" for Espionage against Multiple Countries
Spyder Patchwork
2023-07-05The RecordDaryna Antoniuk
Belarusian hacktivists сlaim to breach country’s leading state university
Cyber Partisans
2023-07-05SentinelOnePhil Stokes
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection
RustBucket
2023-07-04Qianxin Threat Intelligence CenterThreat Intelligence Center
Suspected Maha Grass Organization Uses WarHawk Backdoor Variant Spyder to Spy on Multiple Countries
Spyder Patchwork WarHawk
2023-07-04Russian Panda Research BlogRussianPanda
Unleashing the Viper : A Technical Analysis of WhiteSnake Stealer
WhiteSnake Stealer
2023-07-04The RecordJonathan Greig
Fort Worth officials say leaked data came from Public Information Act request
SiegedSec
2023-07-04Leandro Froes
Reversing a recent IcedID Crypter
PhotoLoader
2023-07-03Check Point ResearchCheckpoint Research
Chinese Threat Actors Targeting Europe in SmugX Campaign
DOPLUGS SmugX