Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-07-26CYBER GEEKS All Things InfosecCyberMasterV
HOW to Analyze Linux Malware - A Case Study of Symbiote
Symbiote
2022-07-26splunkSplunk Threat Research Team
ML Detection of Risky Command Exploit
2022-07-26YoroiCarmelo Ragusa, Luigi Martire
On the FootSteps of Hive Ransomware
Hive Hive
2022-07-26Cyber GeeksVlad Pasca
How To Analyze Linux Malware – A Case Study Of Symbiote
Symbiote
2022-07-26Cert-UACert-UA
UAC-0010 (Armageddon) cyberattacks using the GammaLoad.PS1_v2 malware (CERT-UA#5003,5013,5069,5071)
Gamaredon Group
2022-07-26MicrosoftMicrosoft 365 Defender Research Team
Malicious IIS extensions quietly open persistent backdoors into servers
CHINACHOPPER MimiKatz
2022-07-25Trend MicroByron Gelera, Ieriz Nicolle Gonzalez, Ivan Nicole Chavez, Katherine Casona, Nathaniel Gregory Ragasa, Nathaniel Morales
LockBit Ransomware Group Augments Its Latest Variant, LockBit 3.0, With BlackMatter Capabilities
BlackMatter LockBit
2022-07-25Cert-UACert-UA
Mass distribution of desktops (Formbook, Snake Keylogger) and use of Malware RelicRace/RelicSource as a means of delivery (CERT-UA#5056)
404 Keylogger Formbook RelicRace
2022-07-25muha2xmadMuhammad Hasan Ali
PDF Analysis of Lokibot malware
LokiBot
2022-07-25KasperskyGReAT
CosmicStrand: the discovery of a sophisticated UEFI firmware rootkit
2022-07-24bin.reJohannes Bader
A DGA Seeded by the Bitcoin Genesis Block
Orchard
2022-07-24Bleeping ComputerBill Toulas
QBot phishing uses Windows Calculator sideloading to infect devices
QakBot
2022-07-23BleepingComputerBill Toulas
North Korean hackers attack EU targets with Konni RAT malware
Konni
2022-07-22DataBreaches.netDissent
Recent cyberattacks put Thai citizens’ privacy and data security at greater risk
Desorden Group
2022-07-22MalwareBookReportsmuzi
THE TRASH PANDA REEMERGES FROM THE DUMPSTER: RACCOON STEALER V2
RecordBreaker
2022-07-22vmwareSneha Shekar
How Push Notifications are Abused to Deliver Fraudulent Links
2022-07-22SekoiaThreat & Detection Research Team
CALISTO continues its credential harvesting campaign
Callisto
2022-07-22YoroiCarmelo Ragusa, Luigi Martire
On The Footsteps of Hive Ransomware
Hive Hive
2022-07-22Binary NinjaXusheng Li
Reverse Engineering a Cobalt Strike Dropper With Binary Ninja
Cobalt Strike
2022-07-22PWC UKKrystle Reid
Old cat, new tricks, bad habits An analysis of Charming Kitten’s new tools and OPSEC errors
TelegramGrabber