Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-06Github (muha2xmad)Muhammad Hasan Ali
Technical analysis of SharkBot android malware
SharkBot
2022-09-05NetbyteSECFareed, Rosamira, Taqi
Scam Android app steals Bank Credentials and SMS: MyPetronas APK
2022-09-05Karsten Hahn
Icarus Stealer
Icarus
2022-09-05ResecurityResecurity
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web
2022-09-05Infinitum ITArda Büyükkaya
Bumblebee Loader Malware Analysis
BumbleBee
2022-09-02DataBreaches.netDissent
Customer data from hundreds of Indonesian and Malaysian restaurants hacked by DESORDEN
Desorden Group
2022-09-02CloudsekMehardeep Singh Sawhney
What Is Redeemer Ransomware and How Does It Spread: A Technical Analysis
2022-09-02Trend MicroNick Dai, Ted Lee, Vickie Su
Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWorm
2022-09-02nccgroupAlberto Segura, Mike Stokkel
Sharkbot is back in Google Play
SharkBot
2022-09-01Medium michaelkoczwaraMichael Koczwara
Hunting C2/Adversaries Infrastructure with Shodan and Censys
Brute Ratel C4 Cobalt Strike Deimos GRUNT IcedID Merlin Meterpreter Nighthawk PoshC2 Sliver
2022-09-01[redacted]Ben Armstrong, Brad Pittack, Danny Quist, Lauren Pearce
BianLian Ransomware Gang Gives It a Go!
BianLian BianLian
2022-09-01Sentinel LABSAleksandar Milenkoski, Amitai Ben Shushan Ehrlich, Juan Andrés Guerrero-Saade
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
2022-09-01Trend MicroTrend Micro
Ransomware Spotlight Black Basta
Black Basta Cobalt Strike MimiKatz QakBot
2022-09-01ZscalerAtinderpal Singh, Brett Stone-Gross
No Honor Among Thieves - Prynt Stealer’s Backdoor Exposed
DarkEye Prynt Stealer WorldWind
2022-09-01IBMEmmy Ebanks, Kevin Henson
Raspberry Robin and Dridex: Two Birds of a Feather
Dridex Raspberry Robin
2022-09-01Sentinel LABSAmitai Ben Shushan Ehrlich
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
JuiceLedger
2022-08-31FourcoreHardik Manocha
Ryuk Ransomware: History, Timeline, And Adversary Simulation
Ryuk
2022-08-31JuniperPaul Kimayong
Asbit: An Emerging Remote Desktop Trojan
Asbit
2022-08-31Intel 471Intel 471 Malware Intelligence team
ERMAC 2.0: Perfecting the Account Takeover
ERMAC
2022-08-31BitSightAndré Tavares
Tracking PrivateLoader: Malware Distribution Service
PrivateLoader RedLine Stealer SmokeLoader