Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-30MicrosoftMicrosoft Security Threat Intelligence
Analyzing attacks using the Exchange vulnerabilities CVE-2022-41040 and CVE-2022-41082
2022-09-30cocomelonccocomelonc
Malware development: persistence - part 12. Accessibility Features. Simple C++ example.
2022-09-30Medium walmartglobaltechJason Reaves, Jonathan Mccay
Diavol resurfaces
Diavol
2022-09-30NCC GroupMichael Mullen, Nikolaos Pantazopoulos, William Backhouse
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
ShadowPad
2022-09-30YoroiCarmelo Ragusa, Luigi Martire
Dissecting BlueSky Ransomware Payload
BlueSky
2022-09-29MicrosoftLinkedIn Threat Prevention and Defense, Microsoft Security Threat Intelligence
ZINC weaponizing open-source software
BLINDINGCAN CLOUDBURST miniBlindingCan
2022-09-29BleepingComputerLawrence Abrams
New Royal Ransomware emerges in multi-million dollar attacks
Royal Ransom
2022-09-29Team CymruS2 Research Team
Seychelles, Seychelles, on the C(2) Shore: An overview of a bulletproof hosting provider named ELITETEAM.
Amadey Raccoon RedLine Stealer SmokeLoader STOP
2022-09-29NTTNTT Security Holdings Corporation
Report on APT Attacks by BlackTech
Bifrost PLEAD TSCookie Flagpro Gh0stTimes SelfMake Loader SPIDERPIG RAT
2022-09-29GTSCGTSC SECURITY TEAM
Warning Campaign Attack Using Zero Day Vulnerability on Microsoft Exchange Server
2022-09-29ReutersBozorgmehr Sharafedin, Joel Schectman
America’s Throwaway Spies How the CIA failed Iranian informants in its secret war with Tehran
2022-09-29SymantecThreat Hunter Team
Witchetty: Group Uses Updated Toolset in Attacks on Governments in Middle East
CHINACHOPPER Lookback MimiKatz PlugX Unidentified 096 (Keylogger) x4 Witchetty
2022-09-29MandiantAlexander Marvi, Greg Blaum
Bad VIB(E)s Part Two: Detection and Hardening within ESXi Hypervisors
2022-09-29MandiantAlexander Marvi, Jeremy Koppen, Jonathan Lepore, Tufail Ahmed
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors
UNC3886
2022-09-29Perception PointIgal Lytzki
Doenerium: It’s Not a Crime to Steal From Thieves
doenerium
2022-09-28SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors
2022-09-28Twitter (@ESETresearch)ESET Research
Twitter Thread linking CloudMensis to RokRAT / ScarCruft
CloudMensis RokRAT
2022-09-28vmwareGiovanni Vigna
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
Avoslocker Babuk Black Basta BlackCat BlackMatter Conti DarkSide HelloKitty Hive LockBit Luna RansomEXX RedAlert Ransomware REvil
2022-09-28LumenBlack Lotus Labs
Chaos Is A Go-Based Swiss Army Knife Of Malware
Chaos Kaiji
2022-09-28Recorded FutureInsikt Group®
1 KEY FOR 1 LOCK: The Chinese Communist Party’s Strategy for Targeted Propaganda