Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-02-03SOC PrimeVeronika Telychko
UAC-0114 Group aka Winter Vivern Attack Detection: Hackers Launch Phishing Campaigns Targeting Government Entities of Ukraine and Poland
Winter Vivern
2023-02-03AonZachary Reichert
AgentVX And Taurus
Taurus Stealer
2023-02-03MandiantGenevieve Stark, Kimberly Goody
Float Like a Butterfly Sting Like a Bee
BazarBackdoor BumbleBee Cobalt Strike
2023-02-03Bleeping ComputerSergiu Gatlan
Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide
ESXiArgs
2023-02-03OVHcloudJulien Levrard
Ransomware targeting VMware ESXi
ESXiArgs
2023-02-03MicrosoftClint Watts
Iran responsible for Charlie Hebdo attacks
Cotton Sandstorm
2023-02-03Youtube (Dr Josh Stroschein)Josh Stroschein
Unpacking NullMixer - Identifying and Unraveling ASPack (Part 2)
Nullmixer
2023-02-03KNF CSIRTMichał Strzelczyk, Łukasz Cepok
HookBot – A New Mobile Malware
Hook
2023-02-03CleafyAlessandro Strino, Francesco Iubatti
PixPirate: a new Brazilian Banking Trojan
PixPirate
2023-02-03Huntress LabsChad Hudson
Ave Maria and the Chambers of Warzone RAT
Ave Maria
2023-02-02K7 SecurityVigneshwaran P
Ransomed by Warlock Dark Army “OFFICIALS”
Chaos
2023-02-02MicrosoftMicrosoft
Iran responsible for Charlie Hebdo attacks
Cotton Sandstorm
2023-02-020x0d4y0x0d4y
[Zero2Automated] Complete Custom Sample Challenge Analysis
CruLoader
2023-02-02YouTube (Embee Research)Embee_research
Xworm Loader Analysis - Decoding Malware Scripts and Extracting C2's with DnSpy and CyberChef
XWorm
2023-02-02WithSecureSami Ruohonen, Stephen Robinson
No Pineapple! –DPRK Targeting of Medical Research and Technology Sector
Dtrack GREASE QuiteRAT
2023-02-02YouTube (SLEUTHCON)Christopher Glyer, Microsoft Threat Intelligence Center (MSTIC)
Lions, Tigers, and Infostealers - Oh my!
RecordBreaker RedLine Stealer Vidar
2023-02-02KrollElio Biasiotto, Stephen Green
Hive Ransomware Technical Analysis and Initial Access Discovery
BATLOADER Cobalt Strike Hive
2023-02-02ElasticAndrew Pease, Cyril François, Devon Kerr, Remco Sprooten, Salim Bitam, Seth Goodwin
Update to the REF2924 intrusion set and related campaigns
DoorMe ShadowPad SiestaGraph
2023-02-02cocomelonccocomelonc
Malware analysis: part 7. Yara rule example for CRC32. CRC32 in REvil ransomware
REvil
2023-02-02FortinetShunichi Imano
Ransomware Roundup – Trigona Ransomware
Trigona