Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-29MandiantAlexander Marvi, Jeremy Koppen, Jonathan Lepore, Tufail Ahmed
Bad VIB(E)s Part One: Investigating Novel Malware Persistence Within ESXi Hypervisors
UNC3886
2022-09-29Perception PointIgal Lytzki
Doenerium: It’s Not a Crime to Steal From Thieves
doenerium
2022-09-28SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: Detecting STEEP#MAVERICK: New Covert Attack Campaign Targeting Military Contractors
2022-09-28Twitter (@ESETresearch)ESET Research
Twitter Thread linking CloudMensis to RokRAT / ScarCruft
CloudMensis RokRAT
2022-09-28vmwareGiovanni Vigna
ESXi-Targeting Ransomware: The Threats That Are After Your Virtual Machines (Part 1)
Avoslocker Babuk Black Basta BlackCat BlackMatter Conti DarkSide HelloKitty Hive LockBit Luna RansomEXX RedAlert Ransomware REvil
2022-09-28LumenBlack Lotus Labs
Chaos Is A Go-Based Swiss Army Knife Of Malware
Chaos Kaiji
2022-09-28Recorded FutureInsikt Group®
1 KEY FOR 1 LOCK: The Chinese Communist Party’s Strategy for Targeted Propaganda
2022-09-28KasperskyGReAT
Prilex: the pricey prickle credit card complex
2022-09-28BarracudaTushar Richabadas
Threat Spotlight: Continuing attacks on Atlassian Confluence zero day
2022-09-28GigamonPavle Culum, Roman Kroshinsky
Investigating Web Shells
Godzilla Webshell Behinder
2022-09-28ArrowRATArrowRat
ArrowRat
ArrowRAT
2022-09-27SquiblydooSquiblydoo
Solarmarker: The Old is New
solarmarker
2022-09-27Github (blacklotuslabs)Black Lotus Labs
Chaos Is A Go-Based Swiss Army Knife Of Malware (IOCs)
2022-09-27Palo Alto Networks Unit 42Mark Lim
More Than Meets the Eye: Exposing a Polyglot File That Delivers IcedID
PhotoLoader
2022-09-27Cyber GeeksVlad Pasca
A technical analysis of Pegasus for Android – Part 2
Chrysaor
2022-09-27SecurityScorecardVlad Pasca
A Deep Dive Into the APT28’s stealer called CredoMap
CredoMap
2022-09-26Youtube (Virus Bulletin)Takahiro Haruyama
Tracking the entire iceberg long term APT malware C2 protocol emulation and scanning
ShadowPad Winnti
2022-09-26SentinelOneDinesh Devadoss, Phil Stokes
Lazarus ‘Operation In(ter)ception’ Targets macOS Users Dreaming of Jobs in Crypto
Interception
2022-09-26KasperskyArtem Ushkov, Haim Zigel, Oleg Kupreev
NullMixer: oodles of Trojans in a single dropper
ColdStealer DanaBot GCleaner Nullmixer PrivateLoader PseudoManuscrypt RedLine Stealer SmokeLoader Vidar
2022-09-26The DFIR ReportThe DFIR Report
BumbleBee: Round Two
BumbleBee Cobalt Strike Meterpreter