Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-30CISACISA, Department of the Treasury (Treasury), FBI, FINCEN
CSA (AA22-181A): #StopRansomware: MedusaLocker
MedusaLocker
2022-06-30Cyber Geeks (CyberMasterV)Vlad Pasca
How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-06-30Trend MicroEmmanuel Panopio, James Panlilio, John Kenneth Reyes, Kenneth Adrian Apostol, Melvin Singwa, Mirah Manlapig, Paolo Ronniel Labrador
Black Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit
Black Basta Cobalt Strike QakBot
2022-06-29SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Raccoon Stealer v2 – Part 2: In-depth analysis
Raccoon
2022-06-29Group-IBAndrey Zhdanov, Oleg Skulkin
Fat Cats - An analysis of the BlackCat ransomware affiliate program
BlackCat BlackCat
2022-06-29Fox-ITAlberto Segura, Rolf Govers
Flubot: the evolution of a notorious Android Banking Malware
FluBot
2022-06-29Github (vc0RExor)Aaron Jornet Sales
Machete Weapons Lokibot - A Malware Report
LokiBot
2022-06-29IntezerJoakim Kennedy
YTStealer Malware: “YouTube Cookies! Om Nom Nom Nom”
YTStealer
2022-06-28SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Raccoon Stealer v2 – Part 1: The return of the dead
Raccoon
2022-06-28TrustwaveKatrina Udquin
Interactive Phishing Mark II: Messenger Chatbot Leveraged in a New Facebook-Themed Spam
2022-06-28KrebsOnSecurityBrian Krebs
The Link Between AWM Proxy & the Glupteba Botnet
Glupteba
2022-06-28Twitter (@_CPResearch_)Check Point Research
Tweet on malware used against Steel Industry in Iran
Meteor Predatory Sparrow
2022-06-28SymantecThreat Hunter Team, Vishal Kamble
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem
BumbleBee
2022-06-28MandiantMandiant Threat Intelligence
Pro-PRC DRAGONBRIDGE Influence Campaign Targets Rare Earths Mining Companies in Attempt to Thwart Rivalry to PRC Market Dominance
2022-06-28LumenBlack Lotus Labs
ZuoRAT Hijacks SOHO Routers To Silently Stalk Networks
ZuoRAT Cobalt Strike
2022-06-28Reversing LabsJoseph Edwards
Smash-and-grab: AstraLocker 2.0 pushes ransomware direct from Office docs
AstraLocker
2022-06-28AhnLabASEC
New Info-stealer Disguised as Crack Being Distributed
ClipBanker CryptBot Raccoon RedLine Stealer
2022-06-28GBHackers on SecurityGurubaran S
Black Basta Ransomware Emerging From Underground to Attack Corporate Networks
Black Basta
2022-06-28Twitter (@_icebre4ker_)Fr4
Revive and Coper are using similar phishing template and app
Coper
2022-06-27CyberArkBen Cohen, The CyberArk Malware Research Team
Inside Matanbuchus: A Quirky Loader
Matanbuchus