Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-02-20cocomelonccocomelonc
Malware AV/VM evasion - part 12: encrypt payload via TEA. Simple C++ example.
2023-02-19Medium System WeaknessLena (LambdaMamba)
Investigating a Fake KDDI Smishing Campaign that abuses Duck DNS
Roaming Mantis
2023-02-19Geeky Panda TalesGeekyPanda
The Infostealer Pie: Python Malware Analysis
Venus Stealer
2023-02-18secrssQianxin Virus Response Center
Don’t follow in the footsteps of the 4 billion data leak incident! Early warning for attacks in the financial and securities industries
ValleyRAT
2023-02-18malware.loveRobert Giczewski
TrueBot Analysis Part II - Static unpacker
Silence
2023-02-17Trend MicroJaromír Hořejší, Joseph C Chen
Earth Kitsune Delivers New WhiskerSpy Backdoor via Watering Hole Attack
WhiskerSpy Earth Kitsune
2023-02-17cybleCyble
The Many Faces of Qakbot Malware: A Look at Its Diverse Distribution Methods
QakBot
2023-02-17Twitter (@luc4m)Luca Mella
Tweets about Darkbit's intermittent encryption
DarkBit
2023-02-16cybleCyble
ALTOUFAN TEAM Targets the Middle East
Altoufan Team
2023-02-16ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
APT SideCopy Targeting Indian Government Entities - Analysis of the new version of ReverseRAT
Unidentified 005 (Sidecopy) ReverseRAT
2023-02-16SentinelOneAleksandar Milenkoski, Collin Farr, Joey Chen, QGroup
WIP26 Espionage | Threat Actors Abuse Cloud Infrastructure in Targeted Telco Attacks
2023-02-16ThreatZeroRaphael Mendonça
Mass Attack buhtiRansom - CVE-2022–47986
2023-02-16EclecticIQEclecticIQ Threat Research Team
Three Cases of Cyber Attacks on the Security Service of Ukraine and NATO Allies, Likely by Russian State-Sponsored Gamaredon
2023-02-16Trend MicroHara Hiroaki, Masaoki Shoji, Yuka Higashi
Invitation to a Secret Event: Uncovering Earth Yako’s Campaigns
MirrorKey TransBox Earth Yako
2023-02-16Check Point ResearchCheck Point Research, Checkpoint
Operation Silent Watch: Desktop Surveillance in Azerbaijan and Armenia
OxtaRAT
2023-02-16GoogleShane Huntley
Fog of war: how the Ukraine conflict transformed the cyber threat landscape
APT28 Ghostwriter SaintBear Sandworm Turla
2023-02-15The RecordDaryna Antoniuk
Scandinavian Airlines hit by cyberattack, ‘Anonymous Sudan’ claims responsibility
UserSec
2023-02-15CERT-EUCERT-EU, ENISA
JP-23-01 - Sustained activity by specific threat actors
2023-02-15AhnLabASEC
Paradise Ransomware Distributed Through AweSun Vulnerability Exploitation
Paradise
2023-02-15GoogleGoogle Threat Analysis Group, Mandiant
Fog of War: How the Ukraine Conflict Transformed the Cyber Threat Landscape
CaddyWiper Dharma HermeticWiper INDUSTROYER2 PartyTicket WhisperGate Callisto Curious Gorge MUSTANG PANDA Turla