Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-02Trend MicroNick Dai, Ted Lee, Vickie Su
Buzzing in the Background: BumbleBee, a New Modular Backdoor Evolved From BookWorm
2022-09-02nccgroupAlberto Segura, Mike Stokkel
Sharkbot is back in Google Play
SharkBot
2022-09-01Medium michaelkoczwaraMichael Koczwara
Hunting C2/Adversaries Infrastructure with Shodan and Censys
Brute Ratel C4 Cobalt Strike Deimos GRUNT IcedID Merlin Meterpreter Nighthawk PoshC2 Sliver
2022-09-01[redacted]Ben Armstrong, Brad Pittack, Danny Quist, Lauren Pearce
BianLian Ransomware Gang Gives It a Go!
BianLian BianLian
2022-09-01Sentinel LABSAleksandar Milenkoski, Amitai Ben Shushan Ehrlich, Juan Andrés Guerrero-Saade
The Mystery of Metador | An Unattributed Threat Hiding in Telcos, ISPs, and Universities
2022-09-01Trend MicroTrend Micro
Ransomware Spotlight Black Basta
Black Basta Cobalt Strike MimiKatz QakBot
2022-09-01safebreachTomer Bar
SafeBreach Labs Researchers Uncover New Remote Access Trojan (RAT)
2022-09-01ZscalerAtinderpal Singh, Brett Stone-Gross
No Honor Among Thieves - Prynt Stealer’s Backdoor Exposed
DarkEye Prynt Stealer WorldWind
2022-09-01muha2xmadMuhammad Hasan Ali
Technical analysis of SOVA android malware
S.O.V.A.
2022-09-01IBMEmmy Ebanks, Kevin Henson
Raspberry Robin and Dridex: Two Birds of a Feather
Dridex Raspberry Robin
2022-09-01Sentinel LABSAmitai Ben Shushan Ehrlich
PyPI Phishing Campaign | JuiceLedger Threat Actor Pivots From Fake Apps to Supply Chain Attacks
JuiceLedger
2022-09-01abuse.chabuse.ch
New stealer in town
Erbium Stealer
2022-08-31FourcoreHardik Manocha
Ryuk Ransomware: History, Timeline, And Adversary Simulation
Ryuk
2022-08-31BitdefenderMartin Zugec
Deep Dive into a Corporate Espionage Operation
2022-08-31SecurityScorecardAlex Heid, Robert Ames, Ryan Slaney
Analysis of APT35 Infrastructure Reveals Interest in Egyptian Shipping Companies
2022-08-31JuniperPaul Kimayong
Asbit: An Emerging Remote Desktop Trojan
Asbit
2022-08-31Intel 471Intel 471 Malware Intelligence team
ERMAC 2.0: Perfecting the Account Takeover
ERMAC
2022-08-31BitSightAndré Tavares
Tracking PrivateLoader: Malware Distribution Service
PrivateLoader RedLine Stealer SmokeLoader
2022-08-30eSentireeSentire Threat Response Unit (TRU)
Hacker Infrastructure Used in Cisco Breach Discovered Attacking a Top Workforce Management Corporation & an Affiliate of Russia’s Evil Corp Gang Suspected, Reports eSentire
Cobalt Strike FiveHands UNC2447
2022-08-30SecurityScorecardRobert Ames
Brute Force Attempts May Have Preceded Ransomware Attack on School District