Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-28TrustwaveKatrina Udquin
Interactive Phishing Mark II: Messenger Chatbot Leveraged in a New Facebook-Themed Spam
2022-06-28SymantecThreat Hunter Team, Vishal Kamble
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem
BumbleBee
2022-06-28MandiantMandiant Threat Intelligence
Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance
2022-06-28LumenBlack Lotus Labs
ZuoRAT Hijacks SOHO Routers To Silently Stalk Networks
ZuoRAT Cobalt Strike
2022-06-28GBHackers on SecurityGurubaran S
Black Basta Ransomware Emerging From Underground to Attack Corporate Networks
Black Basta
2022-06-28Twitter (@_icebre4ker_)Fr4
Revive and Coper are using similar phishing template and app
Coper
2022-06-27CyberArkBen Cohen, The CyberArk Malware Research Team
Inside Matanbuchus: A Quirky Loader
Matanbuchus
2022-06-27Webz.ioAvishag Yulevich
Exclusive: Hacktivists Attack Anti-Abortion U.S. States
SiegedSec
2022-06-27Socialist Republic of VietnamInformation Department of Information Security
V/v to review and prevent risks attack APT
Aoqin Dragon
2022-06-27VirusTotalVirusTotal
Deception at scale: How malware abuses trust
2022-06-27BlackberryThe BlackBerry Research & Intelligence Team
Threat Spotlight: Eternity Project MaaS Goes On and On
Eternity Stealer
2022-06-27ZscalerSahil Antil, Sudeep Singh
Return of the Evilnum APT with updated TTPs and new targets
EVILNUM EVILNUM
2022-06-27Kaspersky ICS CERTArtem Snegirev, Kirill Kruglov
Attacks on industrial control systems using ShadowPad
Cobalt Strike PlugX ShadowPad
2022-06-24Group-IBAlbert Priego
We see you, Gozi Hunting the latest TTPs used for delivering the Trojan
ISFB
2022-06-24Soc InvestigationBalaGanesh
IcedID Banking Trojan returns with new TTPS – Detection & Response
IcedID
2022-06-24Palo Alto Networks Unit 42Mark Lim, Riley Porter
There Is More Than One Way to Sleep: Dive Deep Into the Implementations of API Hammering by Various Malware Families
BazarBackdoor Zloader
2022-06-24Cert-UACert-UA
Cyberattack against Ukrainian telecommunications operators using DarkCrystal RAT malware (CERT-UA # 4874)
DCRat Sandworm
2022-06-23CrowdStrikePatrick Bennett
The Call Is Coming from Inside the House: CrowdStrike Identifies Novel Exploit in VOIP Appliance (CVE-2022-29499)
2022-06-23InQuestPedram Amini
Follina, the Latest in a Long Chain of Microsoft Office Exploits
2022-06-23SecureworksCounter Threat Unit ResearchTeam
BRONZE STARLIGHT Ransomware Operations Use HUI Loader
ATOMSILO Cobalt Strike HUI Loader LockFile NightSky Pandora PlugX Quasar RAT Rook SodaMaster BRONZE STARLIGHT