Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-16Group-IBAnastasia Tikhonova
Thousands of IDs exposed in yet another data breach in Brazil
2022-06-16BlackberryThe BlackBerry Research & Intelligence Team
Threat Thursday: Unique Delivery Method for Snake Keylogger
404 Keylogger
2022-06-16RiskIQJennifer Grob
RiskIQ: New ManaTools Panel Identified
2022-06-16Justin Albrecht, Paul Shunk
Lookout Uncovers Android Spyware Deployed in Kazakhstan
Hermit
2022-06-16LookoutJustin Albrecht, Paul Shunk
Lookout Uncovers Android Spyware Deployed in Kazakhstan
2022-06-16SANS ISCXavier Mertens
Houdini is Back Delivered Through a JavaScript Dropper
Houdini
2022-06-16ESET ResearchRene Holt
How Emotet is changing tactics in response to Microsoft’s tightening of Office macro security
Emotet
2022-06-16Medium s2wlabS2W TALON
Raccoon Stealer is Back with a New Version
Raccoon
2022-06-16SophosLabs UncutAndrew Brandt
Confluence exploits used to drop ransomware on vulnerable servers
Cerber
2022-06-15Joie Salvio, Roy Tay
New IceXLoader 3.0 – Developers Warm Up to Nim
win.icexloader
2022-06-15AkamaiStiv Kupchik
Panchan’s Mining Rig: New Golang Peer-to-Peer Botnet Says “Hi!”
2022-06-15F5 LabsDavid Warburton, Dor Nizar, Malcolm Heath, Sander Vinberg
F5 Labs Investigates MaliBot
2022-06-15AttackIQAttackIQ Adversary Research Team, Jackson Wells
Attack Graph Emulating the Conti Ransomware Team’s Behaviors
BazarBackdoor Conti TrickBot
2022-06-15ThreatStopOfir Ashman
First Conti, then Hive: Costa Rica gets hit with ransomware again
Conti Hive Conti Hive
2022-06-15QualysAkshat Pradhan
Fake Cracked Software Caught Peddling Redline Stealers
RedLine Stealer
2022-06-15VolexitySteven Adair, Thomas Lancaster, Volexity Threat Research
DriftingCloud: Zero-Day Sophos Firewall Exploitation and an Insidious Breach
pupy Sliver DriftingCloud
2022-06-15Security JoesCharles Lomboni, Felipe Duarte, Venkat Rajgor
Backdoor via XFF: Mysterious Threat Actor Under Radar
CHINACHOPPER
2022-06-14RiskIQJordan Herman
RiskIQ: Identifying BumbleBee Command and Control Servers
BumbleBee
2022-06-14Twitter (@3xp0rtblog)3xp0rt
Tweet on Keona Clipper
Keona
2022-06-13SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
BumbleBee: a new trendy loader for Initial Access Brokers
BumbleBee