Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-30eSentireeSentire Threat Response Unit (TRU)
Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Management Corporation & an Affiliate of Russia’s Evil Corp Gang Suspected, Reports eSentire
Cobalt Strike FiveHands UNC2447
2022-08-30SecurityScorecardRobert Ames
Brute Force Attempts May Have Preceded Ransomware Attack on School District
2022-08-30Github (vc0RExor)vc0RExor
SmokeLoader - Quick-Analysis
SmokeLoader
2022-08-30CYBER GEEKS All Things InfosecCyberMasterV
ChromeLoader Browser Hijacker
Choziosi
2022-08-30ProofpointMichael Raggi, PWC UK, Sveva Vittoria Scenarelli
Rising Tide: Chasing the Currents of Espionage in the South China Sea
scanbox Meterpreter APT40
2022-08-29SekoiaLivia Tibirna, Quentin Bourgue, Threat & Detection Research Team
Traffers: a deep dive into the information stealer ecosystem
MetaStealer PrivateLoader Raccoon RedLine Stealer Vidar
2022-08-29SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems
2022-08-29Cyfirmacyfirma
CosmicDuke Malware Analysis Report
CosmicDuke
2022-08-29Palo Alto Networks Unit 42Janos Szurdi
Tor 101: How Tor Works and its Risks to the Enterprise
2022-08-29NetskopeGustavo Palazolo
AsyncRAT: Using Fully Undetected Downloader
AsyncRAT
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-08-29McAfeeOliver Devane, Vallabh Chole
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
2022-08-29Check PointMoshe Marelus
Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications
Nitrokod
2022-08-28BleepingComputerIonut Ilascu
LockBit ransomware gang gets aggressive with triple-extortion tactic
LockBit
2022-08-26cocomelonc
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example.
Kimsuky
2022-08-25DataBreaches.netDissent
Major Indonesia tollroad operator hacked by DESORDEN (Updated)
Desorden Group
2022-08-25Palo Alto Networks Unit 42Amer Elsad
Threat Assessment: Black Basta Ransomware
Black Basta QakBot
2022-08-25ResecurityResecurity
COVID-19 Data Put For Sale In Dark Web
2022-08-25BitdefenderAlexandru Maximciuc, Victor Vrabie
Hiding in the Shadows: Investigation of a Corporate Espionage Attack
2022-08-25SK ShieldusSK Shieldus
Ghost Ransomware Response and Attack Analysis Report
Gwisin