Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-04MandiantBrandan Schondorfer, Jennifer Brito, Nader Zaveri, Tyler McLellan
Old Services, New Tricks: Cloud Metadata Abuse by UNC2903
WSO
2022-04-19cybleCyble
Fake MetaMask App Steals Cryptocurrency
2022-04-10Bleeping ComputerBill Toulas
New Meta information stealer distributed in malspam campaign
BlackGuard Mars Stealer Raccoon
2022-04-06SANS ISCBrad Duncan
Windows MetaStealer Malware
2022-04-06InfoSec Handlers Diary BlogBrad Duncan
Windows MetaStealer Malware
MetaStealer
2022-04-01META
Adversarial Threat Report
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-28Twitter (@M_haggis)The Haag
Tweet on parsing Daxin driver metadata using powershell
Daxin
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-26METAMETA
Meta’s Ongoing Efforts Regarding Russia’s Invasion of Ukraine
2022-02-09Bleeping ComputerSergiu Gatlan
Meta and Chime sue Nigerians behind Facebook, Instagram phishing
2022-02-02IBMKevin Henson
TrickBot Gang Uses Template-Based Metaprogramming in Bazar Malware
BazarBackdoor TrickBot
2021-12-07sysdigAlberto Pellitteri
Threat news: TeamTNT stealing credentials using EC2 Instance Metadata
TeamTNT
2021-11-16METADavid Agranovich, Mike Dvilyanski
Taking Action Against Hackers in Pakistan and Syria
SideCopy
2021-11-01METAMETA
October 2021 Coordinated Inauthentic Behavior Report
2021-09-02AhnLabASEC Analysis Team
Attacks using metasploit meterpreter
Appleseed Meterpreter
2021-09-02nvisoMaxime Thiebaut
Anatomy and Disruption of Metasploit Shellcode
2021-08-06metabaseqJesus Dominguez, Miguel Gonzalez
Inside DarkSide, the ransomware that attacked Colonial Pipeline
DarkSide
2021-06-02Trend MicroDaniel Lunghi
Taking Advantage of PE Metadata,or How To Complete your Favorite ThreatActor’s Sample Collection (Paper)
HyperSSL
2021-06-02Trend MicroDaniel Lunghi
Taking Advantage of PE Metadata, or How To Complete Your Favorite Threat Actor’s Sample Collection
HyperSSL