Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-21GdataKarsten Hahn
Identifying file manipulation in system files
2022-09-21ZscalerRomain Dumont
Technical Analysis of Crytox Ransomware
Crytox
2022-09-21MicrosoftAbhishek Pustakala, Harshita Tripathi, Microsoft 365 Defender Research Team, Shivang Desai
Rewards plus: Fake mobile banking rewards apps lure users to install info-stealing RAT on Android devices
2022-09-21MicrosoftMicrosoft Detection and Response Team (DART), Microsoft Security Experts
The art and science behind Microsoft threat hunting: Part 2
2022-09-21Check PointJiří Vinopal
Native function and Assembly Code Invocation
MiniDuke
2022-09-21CISACISA, FBI
AA22-264A: Iranian State Actors Conduct Cyber Operations Against the Government of Albania (PDF)
Unidentified 095 (Iranian Wiper)
2022-09-21CISACISA, FBI
Alert (AA22-264A) Iranian State Actors Conduct Cyber Operations Against the Government of Albania
Unidentified 095 (Iranian Wiper)
2022-09-21Twitter (@0xToxin)@0xToxin
doenerium phishing campaign
doenerium
2022-09-21BitSightJoão Batista
SystemBC: The Multipurpose Proxy Bot Still Breathes
SystemBC
2022-09-21Github (muha2xmad)Muhammad Hasan Ali
Technical analysis of Hydra android malware
Hydra Joker
2022-09-20cocomelonc
Malware development: persistence - part 11. Powershell profile. Simple C++ example.
Turla RAT TurlaRPC
2022-09-20vmwareDana Behling
Threat Report: Illuminating Volume Shadow Deletion
Conti HelloKitty
2022-09-20vmwareDana Behling
Threat Research: New Method of Volume Shadow Backup Deletion Seen in Recent Ransomware
2022-09-20Recorded FutureInsikt Group®
Threat Actors Continue to Abuse Google Tag Manager for Payment Card e-Skimming
2022-09-19CyberScoopAJ Vicens
Hacking group focused on Central America dumps 10 terabytes of military emails, files
Guacamaya
2022-09-19FortinetXiaopeng Zhang
Excel Document Delivers Multiple Malware By Exploiting CVE-2017-11882 – Part I
Formbook RedLine Stealer
2022-09-19Virus BulletinTakahiro Haruyama
Tracking the entire iceberg - long-term APT malware C2 protocol emulation and scanning
ShadowPad Winnti
2022-09-19Recorded FutureInsikt Group®
Russia-Nexus UAC-0113 Emulating Telecommunication Providers in Ukraine
Ave Maria Colibri Loader DCRat
2022-09-19vmwareAbe Schneider, Bethany Hardin, Lavine Oluoch
The Evolution of the Chromeloader Malware
Choziosi
2022-09-18K7 SecurityRahul R
Raccoon back with new claws!
Raccoon