Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-09DCSODCSO CyTec
XZ Backdoor: How to check if your systems are affected
xzbot
2024-04-09kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] Phishing email distributes WarZone RAT via DBatLoader
Ave Maria DBatLoader
2024-04-08ZscalerNikolaos Pantazopoulos
Automating Pikabot’s String Deobfuscation
Pikabot
2024-04-07cyber5wM4lcode
Gafgyt Backdoor Analysis
Bashlite
2024-04-04MandiantAshley Pearson, Austin Larsen, Billy Wong, John Wolfram, Joseph Pisano, Josh Murchie, Lukasz Lamparski, Matt Lin, Ron Craft, Ryan Hall, Shawn Chew, Tyler McLellan
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies
TONERJAM
2024-04-04Deep instinctSimon Kenin
DarkBeatC2: The Latest MuddyWater Attack Framework
MuddyC2Go
2024-04-04ProofpointProofpoint Threat Research Team, Team Cymru, TEAM CYMRU S2 THREAT RESEARCH
Latrodectus: This Spider Bytes Like Ice
IcedID Latrodectus
2024-04-03HarfangLabAlice Climent-Pommeret
Raspberry Robin and its new anti-emulation trick
Raspberry Robin
2024-04-03ResecurityResecurity
The New Version Of JsOutProx Is Attacking Financial Institutions In APAC And MENA Via GitLab Abuse
JSOutProx
2024-04-03ThreatMonKerime Gencay
XZ Utils Backdoor Research Report CVE-2024-3094
xzbot
2024-04-03Bleeping ComputerIonut Ilascu
Microsoft still unsure how hackers stole MSA key in 2023 Exchange attack
2024-04-03WiredAndy Greenberg, Matt Burgess
The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind
xzbot
2024-04-03Trend MicroChristopher Boyton
Unveiling the Fallout: Operation Cronos' Impact on LockBit Following Landmark Disruption
LockBit
2024-04-02KasperskyKaspersky Lab ICS CERT
APT and financial attacks on industrial organizations in H2 2023
HellHounds
2024-04-02DarktraceAlexandra Sentenac, Trent Kessler, Victoria Baldie
The Early Bird Catches the Worm: Darktrace’s Hunt for Raspberry Robin
Raspberry Robin
2024-04-02Trend MicroChristopher So
Earth Freybug Uses UNAPIMON for Unhooking Critical APIs
APT41 Earth Freybug
2024-04-02ForescoutForescout Vedere Labs
“All your base are belong to us” – A probe into Chinese-connected devices in US networks
2024-04-02Check Point ResearchAntonis Terefos, Raman Ladutska
Agent Tesla Targeting United States & Australia: Revealing the Attackers' Identities
Agent Tesla Bignosa
2024-04-01Twitter (@embee_research)Embee_research
Passive DNS For Phishing Link Analysis - Identifying 36 Latrodectus Domains With Historical Records and 302 Redirects
Latrodectus
2024-04-01MicrosoftMicrosoft Threat Analysis Center (MTAC)
Same targets, new playbooks: East Asia threat actors employ unique methods