Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-18LogpointAnish Bogati, Nilaa Maharjan
Hunting Lockbit Variation
LockBit
2022-10-17ASECASEC
Amadey Bot Disguised as a Famous Korean Messenger Program Being Distributed
Amadey
2022-10-17SPURSean S.
I Don’t Like Big Gateways (and I Cannot Lie) - How IP Reputation Gets Large Gateways Wrong
2022-10-17KasperskyGeorgy Kucherin, Kurt Baumgartner
DiceyF deploys GamePlayerFramework in online casino development studio
GamePlayerFramework DiceyF Earth Berberoka
2022-10-17Malversegreenplan
Stack String Decryption with Ghidra Emulator (Orchard)
Orchard
2022-10-15vmwareDana Behling
LockBit 3.0 Ransomware Unlocked
LockBit
2022-10-14CloudsekAastha Mittal, Anandeshwar Unnikrishnan
Technical Analysis of BlueSky Ransomware
BlueSky
2022-10-14MicrosoftMicrosoft Security Threat Intelligence
New “Prestige” ransomware impacts organizations in Ukraine and Poland
Prestige
2022-10-13SyrionRaffaele Sabato
QAKBOT BB Configuration and C2 IPs List
QakBot
2022-10-13MicrosoftMicrosoft Threat Hunting, MSRC Team
Hunting for Cobalt Strike: Mining and plotting for fun and profit
Cobalt Strike
2022-10-13HPPatrick Schläpfer
Magniber Ransomware Adopts JavaScript, Targeting Home Users with Fake Software Updates
Magniber
2022-10-13Booz Allen HamiltonBooz Allen Hamilton
Same Cloak, More Dagger: Decoding how the People's Republic of China uses Cyberattacks
2022-10-13BlackberryThe BlackBerry Research & Intelligence Team
BianLian Ransomware Encrypts Files in the Blink of an Eye
BianLian
2022-10-12AhnLabASEC
Analysis on Attack Techniques and Cases Using RDP
CreateHiddenAccount
2022-10-12ThreatFabricThreatFabric
TOAD attacks: Vishing combined with Android banking malware now targeting Italian banks
BRATA Copybara Joker
2022-10-12Trend MicroIan Kenefick, Lucas Silva, Nicole Hernandez
Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike
Black Basta Brute Ratel C4 Cobalt Strike QakBot
2022-10-12NetresecErik Hjelmvik
IcedID BackConnect Protocol
IcedID
2022-10-11Medium (@DCSO_CyTec)Axel Wauer, Denis Szadkowski, Johann Aydinbas
Tracking down Maggie
Maggie
2022-10-11DeepInstinctDeep Instinct Threat Lab
The Russian SpyAgent – a Decade Later and RAT Tools Remain at Risk
TeamSpy
2022-10-11BleepingComputerBill Toulas
Hacking group POLONIUM uses ‘Creepy’ malware against Israel
DeepCreep MegaCreep Unidentified 097 (Polonium Keylogger)