Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-11ESET ResearchMatías Porolli
POLONIUM targets Israel with Creepy malware
CreepySnail CreepExfil DeepCreep MegaCreep Unidentified 097 (Polonium Keylogger)
2022-10-11AhnLabASEC Analysis Team
From Exchange Server vulnerability to ransomware infection in just 7 days
LockBit MimiKatz
2022-10-10RiskIQMicrosoft Threat Intelligence Center (MSTIC)
DEV-0832 Leverages Commodity Tools in Opportunistic Ransomware Campaigns
BlackCat Mount Locker SystemBC Zeppelin
2022-10-09DataBreaches.netDissent
Johnson Fitness and Wellness hit by DESORDEN Group
Desorden Group
2022-10-08Github (itaymigdal)Itay Migdal
Nimbo-C2 - A new C2 Framework
Nimbo-C2 Nimbo-C2
2022-10-07FlashpointFlashpoint
Analysis of CISA releases Advisory on Top CVEs Exploited Chinese State-Sponsored Groups
Lilac Typhoon
2022-10-07CheckmarxAviad Gershon, Dor Tumarkin, Jossef Harush, Raphael Silva, Roman Chikunov, Tal Folkman, Yehuda Gelb
LofyGang – Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year
LofyGang
2022-10-07YouTube (BSides Portland)Pim Trouerbach
SmokeLoader - The Pandora's box of Tricks
SmokeLoader
2022-10-07Team CymruS2 Research Team
A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signal™ Recon
IcedID PhotoLoader
2022-10-06AonAndre Maccarone, Chapin Bryce, John Ailes
Amazon Web Services: Exploring The Cost Of Exfil
2022-10-06ThreatMonThreatMon Malware Research Team
Rhadamanthys Stealer Analysis
Rhadamanthys
2022-10-06TrellixDaksh Kapur
Evolution of BazarCall Social Engineering Tactics
BazarBackdoor BazarCall
2022-10-06PolySwarm
NullMixer Drops Multiple Malware Families
LgoogLoader
2022-10-06SOCRadarSOCRadar
New Spyware RatMilad Targets Middle Eastern Mobile Devices
RatMilad
2022-10-06YouTube ( BSides Budapest IT Security Conference)Georgy Kucherin, Kurt Baumgartner
DiceyF deploys GamePlayerFramework (Video)
GamePlayerFramework
2022-10-06BlackberryThe BlackBerry Research & Intelligence Team
Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims
PlugX
2022-10-06CISAFBI, NSA, US-CERT
Alert (AA22-279A) Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors
2022-10-06Twitter (@ESETresearch)ESET Research
Tweet on Bumblebee being modularized like trickbot
BumbleBee
2022-10-05ZscalerAditya Sharma, Shatak Jain
Analysis of LilithBot Malware and Eternity Threat Group
Eternity Clipper Eternity Stealer Lilith
2022-10-05FortinetXiaopeng Zhang
Excel Document Delivers Multiple Malware by Exploiting CVE-2017-11882 – Part II
Formbook RedLine Stealer