Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-30cybleCyble Research Labs
PennyWise Stealer: An Evasive Infostealer Leveraging YouTube To Infect Users
PennyWise Stealer
2022-06-30CISACISA, Department of the Treasury (Treasury), FBI, FINCEN
CSA (AA22-181A): #StopRansomware: MedusaLocker
MedusaLocker
2022-06-30Cyber Geeks (CyberMasterV)Vlad Pasca
How to Expose a Potential Cybercriminal due to Misconfigurations
Loki Password Stealer (PWS)
2022-06-30Trend MicroEmmanuel Panopio, James Panlilio, John Kenneth Reyes, Kenneth Adrian Apostol, Melvin Singwa, Mirah Manlapig, Paolo Ronniel Labrador
Black Basta Ransomware Operators Expand Their Attack Arsenal With QakBot Trojan and PrintNightmare Exploit
Black Basta Cobalt Strike QakBot
2022-06-30MicrosoftMicrosoft 365 Defender Research Team
Toll fraud malware: How an Android application can drain your wallet
Joker
2022-06-29GoogleJared Wilson
Burrowing your way into VPNs, Proxies, and Tunnels
SMOKEDHAM UNC2465
2022-06-29SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Raccoon Stealer v2 – Part 2: In-depth analysis
Raccoon
2022-06-29Team CymruS2 Research Team
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities
2022-06-29vmwareGiovanni Vigna, Stefano Ortolani
Lateral Movement in the Real World: A Quantitative Analysis
2022-06-29Group-IBAndrey Zhdanov, Oleg Skulkin
Fat Cats - An analysis of the BlackCat ransomware affiliate program
BlackCat BlackCat
2022-06-29Fox-ITAlberto Segura, Rolf Govers
Flubot: the evolution of a notorious Android Banking Malware
FluBot
2022-06-29cybleCyble Research Labs
Bahamut Android Malware Returns With New Spying Capabilities
Bahamut
2022-06-29MandiantJared Wilson
Burrowing your way into VPNs, Proxies, and Tunnels
DarkSide SMOKEDHAM
2022-06-29Github (vc0RExor)Aaron Jornet Sales
Machete Weapons Lokibot - A Malware Report
LokiBot
2022-06-29IntezerJoakim Kennedy
YTStealer Malware: “YouTube Cookies! Om Nom Nom Nom”
YTStealer
2022-06-28SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Raccoon Stealer v2 – Part 1: The return of the dead
Raccoon
2022-06-28AccentureAccenture
Steal(Bit) or exfil, what does it (Ex)Matter? Comparative Analysis of Custom Exfiltration Tools
ExMatter StealBit
2022-06-28TrustwaveKatrina Udquin
Interactive Phishing Mark II: Messenger Chatbot Leveraged in a New Facebook-Themed Spam
2022-06-28KrebsOnSecurityBrian Krebs
The Link Between AWM Proxy & the Glupteba Botnet
Glupteba
2022-06-28Twitter (@_CPResearch_)Check Point Research
Tweet on malware used against Steel Industry in Iran
Meteor Predatory Sparrow