Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-07-13NCC GroupRIFT: Research and Intelligence Fusion Team
Climbing Mount Everest: Black-Byte Bytes Back?
BlackByte
2022-07-13Check PointCheck Point Research
A Hit is made: Suspected India-based Sidewinder APT successfully cyber attacks Pakistan military focused targets
Unidentified 093 (Sidewinder)
2022-07-12MicrosoftMicrosoft 365 Defender Research Team, Microsoft Threat Intelligence Center (MSTIC)
From cookie theft to BEC: Attackers use AiTM phishing sites as entry point to further financial fraud
2022-07-12cybleCyble Research Labs
New Ransomware Groups On The Rise: “RedAlert,” LILITH And 0mega Leading A Wave Of Ransomware Campaigns
RedAlert Ransomware Lilith
2022-07-08SekoiaThreat & Detection Research Team
Vice Society: a discreet but steady double extortion ransomware group
HelloKitty
2022-07-07cybleCyble Research Labs
NoMercy Stealer Adding New Features: New Stealer Rapidly Evolving Into Clipper Malware
2022-07-05cybleCyble Research Labs
Lockbit 3.0 – Ransomware Group Launches New Version
LockBit
2022-07-05Trend MicroTrend Micro Research
Ransomware Spotlight: BlackByte
BlackByte
2022-06-30MicrosoftAmir Kutcher, Microsoft 365 Defender Research Team, Philip Tsukerman, Tomer Cabouly
Using process creation properties to catch evasion techniques
2022-06-30BlackberryThe BlackBerry Research & Intelligence Team
Threat Thursday: China-Based APT Plays Auto-Updater Card to Deliver WinDealer Malware
WinDealer Red Nue
2022-06-30cybleCyble Research Labs
PennyWise Stealer: An Evasive Infostealer Leveraging YouTube To Infect Users
PennyWise Stealer
2022-06-30MicrosoftMicrosoft 365 Defender Research Team
Toll fraud malware: How an Android application can drain your wallet
Joker
2022-06-29SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Raccoon Stealer v2 – Part 2: In-depth analysis
Raccoon
2022-06-29Team CymruS2 Research Team
The Sliding Scale of Threat Actor Sophistication When Reacting to 0-day Vulnerabilities
2022-06-29cybleCyble Research Labs
Bahamut Android Malware Returns With New Spying Capabilities
Bahamut
2022-06-28SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
Raccoon Stealer v2 – Part 1: The return of the dead
Raccoon
2022-06-28Twitter (@_CPResearch_)Check Point Research
Tweet on malware used against Steel Industry in Iran
Meteor Predatory Sparrow
2022-06-27CyberArkBen Cohen, The CyberArk Malware Research Team
Inside Matanbuchus: A Quirky Loader
Matanbuchus
2022-06-27BlackberryThe BlackBerry Research & Intelligence Team
Threat Spotlight: Eternity Project MaaS Goes On and On
Eternity Stealer
2022-06-23SecureworksCounter Threat Unit ResearchTeam
BRONZE STARLIGHT Ransomware Operations Use HUI Loader
ATOMSILO Cobalt Strike HUI Loader LockFile NightSky Pandora PlugX Quasar RAT Rook SodaMaster BRONZE STARLIGHT