Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-15ThreatFabricThreatFabric
BrasDex: A new Brazilian ATS Android Banker with ties to Desktop malware
BrasDex
2022-12-14Chris Partridge
50 Domains Worth Blocking: The Evolution of ViperSoftX's Underreported DGA
ViperSoftX
2022-12-14ESET ResearchDominik Breitenbacher
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
LODEINFO MirrorFace
2022-12-14CybereasonAlon Laufer, Eli Salem, Mark Tsipershtein
Royal Rumble: Analysis of Royal Ransomware
Royal Ransom
2022-12-14Kaspersky LabsGReAT, Kaspersky Lab ICS CERT
Reassessing cyberwarfare. Lessons learned in 2022
NB65
2022-12-13SophosAndreas Klopsch, Andrew Brandt
Signed driver malware moves up the software trust chain
KillAV
2022-12-13KrollDave Truman, George Glass, Keith Wojcieszek, Stephen Green
Threat Actors use Google Ads to Deploy VIDAR Stealer
Vidar
2022-12-13AvertiumAvertium
Everything You Need to Know about Royal Ransomware
Royal Ransom
2022-12-13MandiantMandiant Intelligence
I Solemnly Swear My Driver Is Up to No Good: Hunting for Attestation Signed Malware
POORTRY
2022-12-13Margin ResearchJustin Sherman
Analyzing Russian SDK Pushwoosh and Russian Code Contributions
2022-12-12SOCRadarSOCRadar
Dark Web Profile: APT42 – Iranian Cyber Espionage Group
PINEFLOWER VINETHORN VBREVSHELL BROKEYOLK CHAIRSMACK DOSTEALER GHAMBAR SILENTUPLOADER TAG-56
2022-12-12Palo Alto Networks Unit 42Oz Soprin, Shachar Roitman
Precious Gemstones: The New Generation of Kerberos Attacks
2022-12-12Felipe TarijonFelipe Tarijon
LimeRAT Malware Is Used For Targeting Unskilled Threat Actors
LimeRAT
2022-12-12Trend MicroAlfredo Oliveira, David Fiser
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT
Chaos
2022-12-12ReutersJosh Smith
North Korean cyber spies deploy new tactic: tricking foreign experts into writing research for them
2022-12-12CheckpointJiří Vinopal
Pulling the Curtains on Azov Ransomware: Not a Skidsware but Polymorphic Wiper
Azov Wiper
2022-12-12Github (MalGamy)MalGamy
YARA rule for Vohuk ransomware
Vohuk
2022-12-09SecureworksSecureWorks' Counter Threat Unit Research Team
Drokbk Malware Uses GitHub as Dead Drop Resolver
Drokbk
2022-12-09Positive TechnologiesPTSecurity
APT Cloud Atlas: Unbroken Threat
2022-12-09cocomelonccocomelonc
Malware development: persistence - part 20. UserInitMprLogonScript (Logon Script). Simple C++ example.
Attor Zebrocy