Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-07-06Cluster25Cluster25
LockBit 3.0: “Making The Ransomware Great Again”
LockBit
2022-07-06Medium s2wlabHOTSAUCE | S2W TALON
变脸, Teng Snake (a.k.a. Code Core)
CodeCore Xiaoqiying
2022-07-06FortinetCara Lin
From Follina to Rozena - Leveraging Discord to Distribute a Backdoor
Rozena
2022-07-06IntezerNicole Fishbein
OrBit: New Undetected Linux Threat Uses Unique Hijack of Execution Flow
HiddenWasp OrBit Symbiote
2022-07-05Github (Blank-c)Blank-c
Github Repository for BlankGrabber
BlankGrabber
2022-07-05SOC PrimeVeronika Telychko
Raccoon Stealer Detection: A Novel Malware Version 2.0 Named RecordBreaker Offers Hackers Advanced Password-Stealing Capabilities
RecordBreaker
2022-07-05Soc InvestigationPriyadharshini Balaji
QBot Spreads via LNK Files – Detection & Response
QakBot
2022-07-05cybleCyble Research Labs
Lockbit 3.0 – Ransomware Group Launches New Version
LockBit
2022-07-05Mike Harbison
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors
Brute Ratel C4
2022-07-05Palo Alto Networks Unit 42Mike Harbison, Peter Renals
When Pentest Tools Go Brutal: Red-Teaming Tool Being Abused by Malicious Actors
2022-07-05Trend MicroTrend Micro Research
Ransomware Spotlight: BlackByte
BlackByte
2022-07-04Bleeping ComputerSergiu Gatlan
AstraLocker ransomware shuts down and releases decryptors
AstraLocker
2022-07-01RiskIQRiskIQ
ToddyCat: A Guided Journey through the Attacker's Infrastructure
ShadowPad ToddyCat
2022-07-01CISACISA, Department of the Treasury (Treasury), FBI, FINCEN
Alert (AA22-181A): #StopRansomware: MedusaLocker
MedusaLocker
2022-07-01Malwarebytes LabsChristopher Boyd
AstraLocker 2.0 ransomware isn’t going to give you your files back
AstraLocker
2022-06-30CYBER GEEKS All Things InfosecCyberMasterV
How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-06-30MicrosoftAmir Kutcher, Microsoft 365 Defender Research Team, Philip Tsukerman, Tomer Cabouly
Using process creation properties to catch evasion techniques
2022-06-30BlackberryThe BlackBerry Research & Intelligence Team
Threat Thursday: China-Based APT Plays Auto-Updater Card to Deliver WinDealer Malware
WinDealer Red Nue
2022-06-30GoogleGoogle Threat Analysis Group, Shane Huntley
Countering hack-for-hire groups
Void Balaur
2022-06-30KasperskyPierre Delcher
The SessionManager IIS backdoor: a possibly overlooked GELSEMIUM artefact
MimiKatz Owlproxy SessionManager