Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-03-17MicrosoftAzure Network Security Team
KillNet and affiliate hacktivist groups targeting healthcare with DDoS attacks
2023-03-17Medium s2wlabBLKSMTH, S2W TALON
Kimsuky group appears to be exploiting OneNote like the cybercrime group
2023-03-17ElasticCyril François, Daniel Stepanic
Thawing the permafrost of ICEDID Summary
IcedID PhotoLoader
2023-03-17AhnLabASEC
ShellBot Malware Being Distributed to Linux SSH Servers
PerlBot
2023-03-16IntegoJoshua Long
FBI shuts down 11-year-old NetWire RAT malware
NetWire
2023-03-16OALabsSergei Frankoff
CryptBot
CryptBot
2023-03-16MandiantAlexander Marvi, BRAD SLAYBAUGH, DAN EBREO, Muhammad Umair, TINA JOHNSON, Tufail Ahmed
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
UNC3886
2023-03-16SentinelOneTom Hegel
Winter Vivern | Uncovering a Wave of Global Espionage
APERETIF Winter Vivern
2023-03-16Palo Alto Networks Unit 42Frank Lee, Scott Roland
Bee-Ware of Trigona, An Emerging Ransomware Strain
Cryakl MimiKatz Trigona
2023-03-16SekoiaThreat & Detection Research Team
Peeking at Reaper’s surveillance operations
Chinotto
2023-03-16Team CymruS2 Research Team
MoqHao Part 3: Recent Global Targeting Trends
MoqHao
2023-03-16Trend MicroCedric Pernet, Jaromír Hořejší, Loseway Lu
IPFS: A New Data Frontier or a New Cybercriminal Hideout?
Agent Tesla Formbook RedLine Stealer Remcos
2023-03-16AkamaiAllen West, Chad Seaman, Larry Cashdollar
Uncovering HinataBot: A Deep Dive into a Go-Based Threat
HinataBot
2023-03-15Lab52Lab52
APT-C-36: from NjRAT to LimeRAT
AsyncRAT NjRAT
2023-03-15SeqriteSathwik Ram Prakki
SideCopy Continues to Target Indian Defense Organization
2023-03-15MicrosoftMicrosoft Threat Intelligence
A year of Russian hybrid warfare in Ukraine
CaddyWiper DesertBlade DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket SwiftSlicer WhisperGate
2023-03-15ReliaquestRELIAQUEST THREAT RESEARCH TEAM
QBot: Laying the Foundations for Black Basta Ransomware Activity
Black Basta QakBot
2023-03-15AvastLUIS CORRONS
(Ab)using Adobe Acrobat Sign to distribute malware
RedLine Stealer
2023-03-15CybleincCyble
Unmasking MedusaLocker Ransomware
MedusaLocker
2023-03-15Check Point ResearchJiří Vinopal
DotRunPEX - Demystifying New Virtualized .NET Injector used in the Wild