Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-29ProofpointPim Trouerbach, Selena Larson, Tommy Madjar
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Voldemort
2024-08-21OODA LoopOODA Loop
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
ZeroSevenGroup
2024-08-20SiliconAngleDuncan Riley
Toyota alleges stolen customer data published on hacking site came from outside supplier
ZeroSevenGroup
2024-07-26TrellixMathanraj Thangaraju, Max Kersten, Tomer Shloman
Handala’s Wiper Targets Israel
Handala Hatef Handala
2024-07-16JPCERT/CCShusei Tomonaga
MirrorFace Attack against Japanese Organisations
LODEINFO NOOPDOOR
2024-07-15SekoiaSekoia TDR
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
bugsleep
2024-06-28Trend MicroAhmed Mohamed Ibrahim, Shubham Singh, Sunil Bharti
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer
Water Sigbin
2024-06-25Cado SecurityNate Bill
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect
2024-06-10MandiantMandiant
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Lumma Stealer MetaStealer Raccoon RedLine Stealer RisePro Vidar UNC5537
2024-06-03SpyCloudJames
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft
AMOS
2024-05-30AkamaiMaxim Zavodchik, Ryan Barnett, Stiv Kupchik
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
RedTail
2024-05-07GatewatcherGatewatcher
Cybercrime's Anatomy Threats to the Healthcare World
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-04-22MicrosoftMicrosoft Threat Intelligence
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
GooseEgg
2024-04-10ProofpointSelena Larson, Tommy Madjar
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
Rhadamanthys
2024-04-08ZscalerNikolaos Pantazopoulos
Automating Pikabot’s String Deobfuscation
Pikabot
2024-03-18Perception PointAriel Davidpur, Peleg Cabra
Operation PhantomBlu: New and Evasive Method Delivers NetSupport RAT
NetSupportManager RAT
2024-03-18PCriskTomas Meskauskas
FORCE (.FORCE) ransomware virus – removal and decryption options
Phobos
2024-03-04ProofpointKelsey Merriman, Selena Larson, Tommy Madjar
TA577’s Unusual Attack Chain Leads to NTLM Data Theft
2024-02-29CrowdStrikeJean-Philippe Teissier
The Anatomy of an ALPHA SPIDER Ransomware Attack
BlackCat Alpha Spider