Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-11The Hacker NewsRavie Lakshmaman
Bitter APT Hackers Add Bangladesh to Their List of Targets in South Asia
2022-05-11ExaTrackTristan Pourcelot
Tricephalic Hellkeeper: a tale of a passive backdoor
BPFDoor Bvp47 Uroburos
2022-05-11NTT Security HoldingsNTT Security Holdings
Analysis of an Iranian APTs “E400” PowGoop Variant Reveals Dozens of Control Servers Dating Back to 2020
PowGoop
2022-05-11FortinetFred Gutierrez
Please Confirm You Received Our APT
Saitama Backdoor
2022-05-11KasperskyGReAT
New ransomware trends in 2022
BlackCat Conti DEADBOLT DoubleZero LockBit PartyTicket StealBit
2022-05-11IronNetBlake Cahen, IronNet Threat Research
Detecting a MUMMY SPIDER campaign and Emotet infection
Emotet
2022-05-11SANS ISCBrad Duncan
TA578 using thread-hijacked emails to push ISO files for Bumblebee malware
BumbleBee
2022-05-11K7 SecuritySaikumaravel
Transparent Tribe Targets Educational Institution
Crimson RAT
2022-05-11HPHP Wolf Security
Threat Insights Report Q1 - 2022
AsyncRAT Emotet Mekotio Vjw0rm
2022-05-11Cisco TalosCisco Talos
Bitter APT adds Bangladesh to their targets
AndroRAT Artra Downloader Bitter RAT ZxxZ
2022-05-11InfoSec Handlers Diary BlogBrad Duncan
TA578 using thread-hijacked emails to push ISO files for Bumblebee malware
BumbleBee Cobalt Strike IcedID PhotoLoader
2022-05-11Sandfly SecurityThe Sandfly Security Team
BPFDoor - An Evasive Linux Backdoor Technical Analysis
BPFDoor
2022-05-11ProofpointAndrew Northern, Axel F, Pim Trouerbach, Tony Robinson
Nerbian RAT Using COVID-19 Themes Features Sophisticated Evasion Techniques
Nerbian RAT
2022-05-11NTTRyu Hiyoshi
Operation RestyLink: Targeted attack campaign targeting Japanese companies
Cobalt Strike
2022-05-11CrowdStrikeAdrian Justice, CrowdStrike Overwatch Team
IceApple: A Novel Internet Information Services (IIS) Post-Exploitation Framework
2022-05-11CrowdStrikeAdrian Justice
Proactive Threat Hunting Bears Fruit: Falcon OverWatch Detects Novel IceApple Post-Exploitation Framework
2022-05-10Marco Ramilli's BlogMarco Ramilli
A Malware Analysis in RU-AU conflict
Cobalt Strike
2022-05-10eSentireeSentire Threat Response Unit (TRU)
Redline Stealer Masquerades as Photo Editing Software
RedLine Stealer
2022-05-10RiskIQJennifer Grob
RiskIQ: VBScript Hosted on BlogSpot URL Deploys Malware Associated with NyanCat
2022-05-10RiskIQKelsey Clapp
Commodity Skimming & Magecart Trends in First Quarter of 2022
magecart