Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-21SekoiaAmaury G., Coline Chavane, Kilian Seznec, Sekoia TDR
Master of Puppets: Uncovering the DoppelGänger pro-Russian influence campaign
2024-05-20cybleCyble
Tiny BackDoor Goes Undetected – Suspected Turla leveraging MSBuild to Evade detection
2024-05-16AhnLabASEC
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group)
2024-05-16SecurityIntelligenceGolo Mühr, Melissa Frydrych
Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns
Grandoreiro
2024-05-16SymantecThreat Hunter Team
Springtail: New Linux Backdoor Added to Toolkit
Gomir Kimsuky
2024-05-15MicrosoftMicrosoft Threat Intelligence
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Black Basta Cobalt Strike QakBot SystemBC
2024-05-15ESET ResearchFilip Jurčacko
To the Moon and back(doors): Lunar landing in diplomatic missions
LunarMail
2024-05-15StairwellThreat Research at Stairwell
Stairwell threat report: Black Basta overview and detection rules
Black Basta Black Basta
2024-05-15X (@bryceabdo)Bryce Abdo
Tweet on UNC5449 exploiting CVE-2024-30051 to deliver QAKBOT
QakBot
2024-05-15MicrosoftMicrosoft Threat Intelligence
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Black Basta Cobalt Strike QakBot
2024-05-14NBCDan De Luce, Jean-Nicholas Fievet
China-linked group uses malware to try to spy on commercial shipping, new report says
2024-05-14Bern University of Applied ScienceBenjamin Fehrensen, Dominic Schmutz, Robin Rapp
Forensic analysis of hook Android malware
Hook
2024-05-14Check Point ResearchAntonis Terefos, Tera0017
Foxit PDF “Flawed Design” Exploitation
Rafel RAT Agent Tesla AsyncRAT DCRat DONOT Nanocore RAT NjRAT Pony Remcos Venom RAT XWorm
2024-05-14KasperskyBoris Larin, Mert Degirmenci
QakBot attacks with Windows zero-day (CVE-2024-30051)
Cobalt Strike QakBot
2024-05-14ESET ResearchMarc-Etienne M.Léveillé
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
Ebury
2024-05-14S-RMCallum Wilson, Ineta Simkunaite
Breaking new ground? Uncovering Akira's privilege escalation techniques
Akira
2024-05-13Emerging ThreatsKevin Ross
SIGS: W32/Badspace.Backdoor
WarmCookie
2024-05-13Malsada TechAaron Samala
Gootloader Isn’t Broken
GootLoader
2024-05-13ESET ResearchMarc-Etienne M.Léveillé
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
Ebury
2024-05-13Recorded FutureInsikt Group
Exploring the Depths of SolarMarker's Multi-tiered Infrastructure
solarmarker