Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-03-02Youtube (Microsoft Security Response Center (MSRC))Ben Magee, Daniel Taylor
BlueHat 2023: Hunting Qakbot with Daniel Taylor & Ben Magee
QakBot
2023-03-02ESET ResearchAlexandre Côté Cyr
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
MQsTTang
2023-03-02Wiz.ioAmitai Cohen, Barak Sharoni
Redirection Roulette: Thousands of hijacked websites in East Asia redirecting visitors to other sites
2023-03-02YouTube (Microsoft Security)Laurie Kirk
BlueHat 2023 Lightning Talk: Android Malware Obfuscation
2023-03-02ThreatMonThreatMon Malware Research Team
Behind the Breaches: Mapping Threat Actors and Their CVE Exploits
2023-03-02CISACISA
#StopRansomware: Royal Ransomware
Royal Ransom Royal Ransom
2023-03-02NetresecErik Hjelmvik
QakBot C2 Traffic
QakBot
2023-03-01ZscalerMeghraj Nandanwar, Shatak Jain
OneNote: A Growing Threat for Malware Distribution
AsyncRAT Cobalt Strike IcedID QakBot RedLine Stealer
2023-03-01Trend MicroDaniel Lunghi
Iron Tiger’s SysUpdate Reappears, Adds Linux Targeting
HyperSSL HyperSSL
2023-03-01CrowdStrikeCrowdStrike
Slippy Spider
LAPSUS
2023-03-01ESET ResearchMartin Smolár
BlackLotus UEFI bootkit: Myth confirmed
BlackLotus
2023-02-28sysdigAlberto Pellitteri
SCARLETEEL: Operation leveraging Terraform, Kubernetes, and AWS for data theft
SCARLETEEL
2023-02-28ANY.RUNANY.RUN
XLoader/FormBook: Encryption Analysis and Malware Decryption
Formbook
2023-02-28Intel 471Intel 471
Malvertising Surges to Distribute Malware
EugenLoader BATLOADER IcedID
2023-02-28UptycsUptycs Threat Research
Cryptocurrency Entities at Risk: Threat Actor Uses Parallax RAT for Infiltration
Parallax RAT
2023-02-28FortinetEliran Voronovitch
Can You See It Now? An Emerging LockBit Campaign
LockBit
2023-02-27SekoiaQuentin Bourgue, Threat & Detection Research Team
Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 2
Stealc
2023-02-27BlackberryBlackBerry Research & Intelligence Team
Blind Eagle Deploys Fake UUE Files and Fsociety to Target Colombia's Judiciary, Financial, Public, and Law Enforcement Entities
AsyncRAT APT-C-36
2023-02-27ChannelLifeTom Ragnel
The increasing presence of pro-Russia hacktivists
Zarya
2023-02-27PRODAFT Threat IntelligencePRODAFT
RIG Exploit Kit: In-Depth Analysis
Dridex IcedID ISFB PureCrypter Raccoon RecordBreaker RedLine Stealer Royal Ransom Silence SmokeLoader Zloader