Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-22Kaspersky LabsGReAT
Stealers, stealers and more stealers
2024-05-22DARKReadingElizabeth Montalbano
Novel EDR-Killing 'GhostEngine' Malware Is Built for Stealth
win.ghostengine
2024-05-22Martin Zugec
Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea
SilentGh0st
2024-05-21S-RMFrank de Korte
Phobos ransomware launches new leak site and pivots towards double extortion
Phobos
2024-05-21YoroiCarmelo Ragusa, Luigi Martire
Uncovering an undetected KeyPlug implant attacking industries in Italy
KEYPLUG
2024-05-21ElasticAndrew Pease, Salim Bitam, Samir Bousseaden, Terrance DeJesus
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations
win.ghostengine
2024-05-21SekoiaAmaury G., Coline Chavane, Kilian Seznec, Sekoia TDR
Master of Puppets: Uncovering the DoppelGänger pro-Russian influence campaign
2024-05-21Twitter (@embee_research)Embee_research
Tweets on decoding a Latrodectus loader
Latrodectus
2024-05-20cybleCyble
Tiny BackDoor Goes Undetected – Suspected Turla leveraging MSBuild to Evade detection
2024-05-16AhnLabASEC
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group)
2024-05-16ElasticDaniel Stepanic, Samir Bousseaden
Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID
IcedID Latrodectus
2024-05-16SecurityIntelligenceGolo Mühr, Melissa Frydrych
Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns
Grandoreiro
2024-05-16SymantecThreat Hunter Team
Springtail: New Linux Backdoor Added to Toolkit
Gomir Kimsuky
2024-05-16ANY.RUNANY.RUN
Malware trend: Latrodectus
Latrodectus
2024-05-15MicrosoftMicrosoft Threat Intelligence
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Black Basta Cobalt Strike QakBot SystemBC
2024-05-15ESET ResearchFilip Jurčacko
To the Moon and back(doors): Lunar landing in diplomatic missions
LunarMail
2024-05-15StairwellThreat Research at Stairwell
Stairwell threat report: Black Basta overview and detection rules
Black Basta Black Basta
2024-05-15X (@bryceabdo)Bryce Abdo
Tweet on UNC5449 exploiting CVE-2024-30051 to deliver QAKBOT
QakBot
2024-05-15Twitter (@embee_research)Embee_research
Revealing Spammer Infrastructure With Passive DNS - 226 Toll-Themed Domains Targeting Australia
2024-05-15MicrosoftMicrosoft Threat Intelligence
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Black Basta Cobalt Strike QakBot