Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-12-27Chaos Communication CongressBoris Larin, Georgy Kucherin, Leonid Bezvershenko
Operation Triangulation: What You Get When Attack iPhones of Researchers
TriangleDB
2023-12-24BarracudaBarracuda
Barracuda Email Security Gateway Appliance (ESG) Vulnerability
2023-12-23BarracudaKevin Williams
Scattered Spider spins a troublesome web
2023-12-20Sophos X-OpsMark Loman, Matt Wixey
CryptoGuard: An asymmetric approach to the ransomware battle
Akira LockBit Storm-1567
2023-12-19SymantecSymantec Threat Hunter Team
Seedworm: Iranian Hackers Target Telecoms Orgs in North and East Africa
MuddyC2Go
2023-12-18SeqriteRumana Siddiqui
Decoding BATLOADER 2.X: Unmasking the Threat of Stealthy Malware Tactics
BATLOADER
2023-12-14ImpervaDaniel Johnston
Imperva Detects Undocumented 8220 Gang Activities
Water Sigbin
2023-12-14MandiantAdrian McCabe, Geoff Ackerman, Rufus Brown, Ryan Tomcik
Opening a Can of Whoop Ads: Detecting and Disrupting a Malvertising Campaign Distributing Backdoors
DanaBot DarkGate
2023-12-14Medium (Cryptax)Axelle Apvrille
Bad Zip and new Packer for Android/BianLian
BianLian
2023-12-13Kaspersky LabsGReAT
FakeSG campaign, Akira ransomware and AMOS macOS stealer
AMOS Akira Storm-1567
2023-12-13FortinetAmey Gat, Angelo Cris Deveraturda, Hongkei Chan, Jared Betts, Jayesh Zala, John Simmons, Ken Evans, Mark Robson
TeamCity Intrusion Saga: APT29 Suspected Among the Attackers Exploiting CVE-2023-42793
GraphDrop
2023-12-13HackReadWAQAS
Scammers Weaponize Google Forms in New BazarCall Attack
2023-12-13LumenBlack Lotus Labs
Routers Roasting on an Open Firewall: the KV-botnet Investigation
KV
2023-12-13ShadowStackREShadowStackRE
Rhysida Ransomware
Rhysida Rhysida
2023-12-12Ukrainska PravdaAlona Mazurenko
Ukrainian intelligence attacks and paralyses Russia's tax system
2023-12-12MicrosoftMicrosoft Threat Intelligence
Threat actors misuse OAuth applications to automate financially driven attacks
Storm-1283 Storm-1286
2023-12-11Cisco TalosAsheer Malhotra, Jungsoo An, Vitor Ventura
Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang
BottomLoader DLRAT HazyLoad NineRAT
2023-12-11Sentinel LABSAleksandar Milenkoski, Bendik Hagen
Sandman APT | China-Based Adversaries Embrace Lua
KEYPLUG LuaDream
2023-12-09Github (struppigel)Karsten Hahn
AST based GootLoader unpacker, C2 extractor and deobfuscator
GootLoader
2023-12-08Twitter (@embee_research)Embee_research
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction
Cobalt Strike