Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-03-16MandiantAlexander Marvi, BRAD SLAYBAUGH, DAN EBREO, Muhammad Umair, TINA JOHNSON, Tufail Ahmed
Fortinet Zero-Day and Custom Malware Used by Suspected Chinese Actor in Espionage Operation
UNC3886
2023-03-16SentinelOneTom Hegel
Winter Vivern | Uncovering a Wave of Global Espionage
APERETIF Winter Vivern
2023-03-16Palo Alto Networks Unit 42Frank Lee, Scott Roland
Bee-Ware of Trigona, An Emerging Ransomware Strain
Cryakl MimiKatz Trigona
2023-03-16SekoiaThreat & Detection Research Team
Peeking at Reaper’s surveillance operations
Chinotto
2023-03-16Team CymruS2 Research Team
MoqHao Part 3: Recent Global Targeting Trends
MoqHao
2023-03-16Trend MicroCedric Pernet, Jaromír Hořejší, Loseway Lu
IPFS: A New Data Frontier or a New Cybercriminal Hideout?
Agent Tesla Formbook RedLine Stealer Remcos
2023-03-16AkamaiAllen West, Chad Seaman, Larry Cashdollar
Uncovering HinataBot: A Deep Dive into a Go-Based Threat
HinataBot
2023-03-15Lab52Lab52
APT-C-36: from NjRAT to LimeRAT
AsyncRAT NjRAT
2023-03-15SeqriteSathwik Ram Prakki
SideCopy Continues to Target Indian Defense Organization
2023-03-15MicrosoftMicrosoft Threat Intelligence
A year of Russian hybrid warfare in Ukraine
CaddyWiper DesertBlade DoubleZero HermeticWiper INDUSTROYER2 IsaacWiper PartyTicket SwiftSlicer WhisperGate
2023-03-15ReliaquestRELIAQUEST THREAT RESEARCH TEAM
QBot: Laying the Foundations for Black Basta Ransomware Activity
Black Basta QakBot
2023-03-15AvastLUIS CORRONS
(Ab)using Adobe Acrobat Sign to distribute malware
RedLine Stealer
2023-03-15CybleincCyble
Unmasking MedusaLocker Ransomware
MedusaLocker
2023-03-15Check Point ResearchJiří Vinopal
DotRunPEX - Demystifying New Virtualized .NET Injector used in the Wild
2023-03-14ViuleeenzAlessandro Strino
Dynamic Binary Instrumentation for Malware Analysis
Gozi
2023-03-14CrowdStrikeCrowdStrike
The Zeus Trojan Malware - Definition and Prevention
Zeus
2023-03-14Check Point ResearchBohdan Melnykov, Raman Ladutska
South Korean Android Banking Menace - Fakecalls
Fakecalls
2023-03-14ESET ResearchFacundo Muñoz
The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia
2023-03-14SecuiSTIC
[Threat Analysis] CHM malware targeting North Korea-related corporations
2023-03-14Cisco TalosAsheer Malhotra, Vitor Ventura
Talos uncovers espionage campaigns targeting CIS countries, embassies and EU health care agency
Poet RAT Loda Kasablanka YoroTrooper