Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-07-23BleepingComputerBill Toulas
North Korean hackers attack EU targets with Konni RAT malware
Konni
2022-07-22DataBreaches.netDissent
Recent cyberattacks put Thai citizens’ privacy and data security at greater risk
Desorden Group
2022-07-22MalwareBookReportsmuzi
THE TRASH PANDA REEMERGES FROM THE DUMPSTER: RACCOON STEALER V2
RecordBreaker
2022-07-22vmwareSneha Shekar
How Push Notifications are Abused to Deliver Fraudulent Links
2022-07-22SekoiaThreat & Detection Research Team
CALISTO continues its credential harvesting campaign
Callisto
2022-07-22YoroiCarmelo Ragusa, Luigi Martire
On The Footsteps of Hive Ransomware
Hive Hive
2022-07-22Binary NinjaXusheng Li
Reverse Engineering a Cobalt Strike Dropper With Binary Ninja
Cobalt Strike
2022-07-22PWC UKKrystle Reid
Old cat, new tricks, bad habits An analysis of Charming Kitten’s new tools and OPSEC errors
TelegramGrabber
2022-07-21CensysMatt Lembright
Russian Ransomware C2 Network Discovered in Censys Data
DeimosC2 PoshC2
2022-07-21BlackberryMark Stevens, Rocky De Wiest
The 13 Deadly Sins of APT Incident Response — Part 1
2022-07-21AhnLabASEC
Amadey Bot Being Distributed Through SmokeLoader
Amadey SmokeLoader
2022-07-21cocomelonc
Malware development tricks. Run shellcode like a Lazarus Group. C++ example.
2022-07-21SilentpushSilent Push
It’s time to close the door on open directories
2022-07-21Avast DecodedJan Vojtěšek
The Return of Candiru: Zero-days in the Middle East
Caramel Tsunami
2022-07-21TalosTalos
Attackers target Ukraine using GoMet backdoor
GoMet
2022-07-21Cert-AgIDCert-AgID
Tecniche per semplificare l’analisi del malware GuLoader
CloudEyE
2022-07-21IntezerRyan Robinson
Lightning Framework: New Undetected “Swiss Army Knife” Linux Malware
Lightning Framework
2022-07-21ProofpointBryan Campbell, Pim Trouerbach, Proofpoint Threat Research Team, Selena Larson
Buy, Sell, Steal, EvilNum Targets Cryptocurrency, Forex, Commodities
EVILNUM Evilnum
2022-07-21Trend MicroAlfredo Oliveira, David Fiser
Alibaba OSS Buckets Compromised to Distribute Malicious Shell Scripts via Steganography
2022-07-21Sentinel LABSAleksandar Milenkoski, Jim Walter
LockBit 3.0 Update | Unpicking the Ransomware’s Latest Anti-Analysis and Evasion Techniques
LockBit