Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-06-10Soc InvestigationVignesh Bhaaskaran
New SVCReady malware loads from Word doc properties – Detection & Response
SVCReady
2022-06-09MITREMITRE
MITRE actor profile for Ember Bear
SaintBear
2022-06-09AccentureAccenture
Finding Vulnerabilities with VulFi IDA Plugin
2022-06-09Group-IBIvan Lebedev, Yaroslav Kargalev
Swiss Army Knife Phishing Group-IB identifies massive campaign capable of targeting clients of major Vietnamese banks
2022-06-09Medium (Cryptax)Axelle Apvrille
Quick look into a new sample of Android/BianLian
BianLian Hydra
2022-06-09Palo Alto Networks Unit 42Abigail Barr, Amer Elsad, JR Gumarin
LockBit 2.0: How This RaaS Operates and How to Protect Against It
LockBit
2022-06-09ZscalerAvinash Kumar, Niraj Shivtarkar
Lyceum .NET DNS Backdoor
Lyceum .NET DNS Backdoor
2022-06-09Bleeping ComputerLawrence Abrams
Roblox Game Pass store used to sell ransomware decryptor
Chaos
2022-06-09AvastDominika Regéciová
Yara: In Search Of Regular Expressions
2022-06-09BlackberryJoakim Kennedy, The BlackBerry Research & Intelligence Team
Symbiote: A New, Nearly-Impossible-to-Detect Linux Threat
Symbiote
2022-06-09Sentinel LABSJoey Chen
Aoqin Dragon | Newly-Discovered Chinese-linked APT Has Been Quietly Spying On Organizations For 10 Years
heyoka mongall Aoqin Dragon
2022-06-09InfoSec Handlers Diary BlogBrad Duncan
TA570 Qakbot (Qbot) tries CVE-2022-30190 (Follina) exploit (ms-msdt)
QakBot
2022-06-08TrustwaveJohn Anderson
Not all "Internet Connections" are Equal
2022-06-08SymantecKarthikeyan C Kasiviswanathan, Yuvaraj Megavarnadu
Attackers Exploit MSDT Follina Bug to Drop RAT, Infostealer
AsyncRAT
2022-06-08AvastPavel Novák
Crypto stealing campaign spread via fake cracked software
2022-06-08Malwarebytes LabsThreat Intelligence Team
MakeMoney malvertising campaign adds fake update template
FAKEUPDATES
2022-06-08Trend MicroDon Ovid Ladores
Cuba Ransomware Group’s New Variant Found Using Optimized Infection Techniques
Cuba
2022-06-08Qianxin Threat Intelligence CenterRed Raindrop Team
Operation Tejas: A dying elephant curled up in the Kunlun Mountains
HAZY TIGER RAZOR TIGER
2022-06-07McAfeeJyothi Naveen, Kiran Raj
Phishing Campaigns featuring Ursnif Trojan on the Rise
ISFB
2022-06-07Lacework LabsChris Hall
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134
Dark Kinsing