Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-11-10ZscalerThreatLabZ research team
Rise of Banking Trojan Dropper in Google Play
Xenomorph
2022-11-10FortinetJames Slaughter, Shunichi Imano
Ransomware Roundup: New Inlock and Xorist Variants
Inlock Xorist
2022-11-10IntezerNicole Fishbein
How LNK Files Are Abused by Threat Actors
BumbleBee Emotet Mount Locker QakBot
2022-11-10AhnLabASEC
Penetration and Distribution Method of Gwisin Attacker
Gwisin
2022-11-09Trend MicroHara Hiroaki, Ted Lee
Hack the Real Box: APT41’s New Subgroup Earth Longzhi
Cobalt Strike MimiKatz Earth Longzhi
2022-11-09NetskopeGustavo Palazolo
BlackCat Ransomware: Tactics and Techniques From a Targeted Attack
BlackCat ExMatter
2022-11-09Cisco TalosEdmund Brumaghin
Threat Spotlight: Cyber Criminal Adoption of IPFS for Phishing, Malware Campaigns
Agent Tesla
2022-11-09Security IntelligenceJonathan Reed
Ransomware-as-a-Service Transforms Gangs Into Businesses
Eternity Stealer
2022-11-08Feike Hacquebord, Fernando Mercês, Stephen Hilt
DeimosC2: What SOC Analysts and Incident Responders Need to Know About This C&C Framework
DeimosC2
2022-11-08DCSOAxel Wauer, Johann Aydinbas
#ShortAndMalicious: StrelaStealer aims for mail credentials
StrelaStealer
2022-11-08AhnLabASEC
LockBit 3.0 Being Distributed via Amadey Bot
Amadey Gandcrab LockBit
2022-11-08cybleCyble
Massive YouTube Campaign Targeting Over 100 Applications To Deliver Info Stealer
RecordBreaker Vidar
2022-11-07Trend MicroTrend Micro Mobile Team
Massive Phishing Campaigns Target India Banks’ Clients
AxBanker Elibomi
2022-11-07ThreatMonThreatMon Malware Research Team
Arkei Staler Analysis
Arkei Stealer
2022-11-07SentinelOneAleksandar Milenkoski
SocGholish Diversifies and Expands Its Malware Staging Infrastructure to Counter Defenders
FAKEUPDATES
2022-11-07DarktraceDillon Ashmore, Taisiia Garkava
Inside the Yanluowang Leak: Organization, Members, and Tactics
Yanluowang
2022-11-06LMNTRIXLMNTRIX
Analysis Of Netwire RAT
NetWire RC
2022-11-05cocomelonccocomelonc
Malware analysis: part 6. Shannon entropy. Simple python script.
2022-11-04DataBreaches.netDissent
Malaysian online stock brokerage firm victim of cyberattack
Desorden Group
2022-11-04Github (hktalent)51pwn
Behinder Mem Shell
Behinder