Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-12SOCRadarSOCRadar
Dark Web Profile: APT42 – Iranian Cyber Espionage Group
PINEFLOWER VINETHORN VBREVSHELL BROKEYOLK CHAIRSMACK DOSTEALER GHAMBAR SILENTUPLOADER TAG-56
2022-12-12Palo Alto Networks Unit 42Oz Soprin, Shachar Roitman
Precious Gemstones: The New Generation of Kerberos Attacks
2022-12-12Felipe TarijonFelipe Tarijon
LimeRAT Malware Is Used For Targeting Unskilled Threat Actors
LimeRAT
2022-12-12Trend MicroAlfredo Oliveira, David Fiser
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT
Chaos
2022-12-12ReutersJosh Smith
North Korean cyber spies deploy new tactic: tricking foreign experts into writing research for them
2022-12-12CheckpointJiří Vinopal
Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper
Azov Wiper
2022-12-12Github (MalGamy)MalGamy
YARA rule for Vohuk ransomware
Vohuk
2022-12-09SecureworksSecureWorks' Counter Threat Unit Research Team
Drokbk Malware Uses GitHub as Dead Drop Resolver
Drokbk
2022-12-09Positive TechnologiesPTSecurity
APT Cloud Atlas: Unbroken Threat
2022-12-08Youtube (AhmedS Kasmani)AhmedS Kasmani
Vidar Stealer Malware Analysis
Vidar
2022-12-08TrustwaveDiana Lopera, Phil Hay, Rodel Mendrez
Trojanized OneNote Document Leads to Formbook Malware
Formbook
2022-12-08FortinetFred Gutierrez, Shunichi Imano
Ransomware Roundup – New Vohuk, ScareCrow, and AERST Variants
AESRT ScareCrow Vohuk
2022-12-08KasperskyGReAT
DeathStalker targets legal entities with new Janicab variant
Janicab Janicab Stormwind
2022-12-08Palo Alto Networks Unit 42Dror Alon
Compromised Cloud Compute Credentials: Case Studies From the Wild
2022-12-08Cisco TalosTiago Pereira
Breaking the silence - Recent Truebot activity
Clop Cobalt Strike FlawedGrace Raspberry Robin Silence Teleport
2022-12-08DeepInstinctDeep Instinct Threat Lab, Simon Kenin
New MuddyWater Threat: Old Kitten; New Tricks
2022-12-08ThreatFabricThreatFabric
Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers
ERMAC Xenomorph
2022-12-07K7 SecurityLathashree K
An upsurge of new Android Banking Trojan “Zanubis”
Zanubis
2022-12-07eSentireeSentire Threat Response Unit (TRU)
GootLoader Striking with a New Infection Technique
GootLoader
2022-12-07KnowBe4Stu Sjouwerman
Russian Threat Actor Impersonates Aerospace and Defense Companies