Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-24ESET ResearchLukáš Štefanko
Crypto malware in patched wallets targeting Android and iOS devices
2022-03-24Threat PostNate Nelson
Microsoft Help Files Disguise Vidar Malware
Vidar
2022-03-24CSO OnlineJon Gold
Microsoft help files repurposed to contain Vidar malware in new campaign
Vidar
2022-03-24TrustwaveDiana Lopera
Vidar Malware Launcher Concealed in Help File
Vidar
2022-03-24Cyber Security NewsGurubaran
GIMMICK Malware Attacks macOS to Attack Organizations Across Asia
GIMMICK
2022-03-24Bleeping ComputerBill Toulas
Malicious Microsoft Excel add-ins used to deliver RAT malware
JSSLoader
2022-03-24NextGovBrandi Vincent
Ukrainian Cyber Lead Says ‘At Least 4 Types of Malware’ in Use to Target Critical Infrastructure and Humanitarian Aid
CaddyWiper DoubleZero HermeticWiper IsaacWiper
2022-03-24Recorded FutureInsikt Group
IsaacWiper Continues Trend of Wiper Attacks Against Ukraine
IsaacWiper
2022-03-24United States SenateU.S. Senate Committee on Homeland Security & Governmental Affairs
New Portman Report Demonstrates Threat Ransomware Presents to the United States
REvil
2022-03-24United States SenateU.S. Senate Committee on Homeland Security & Governmental Affairs
America's Data Held Hostage: Case Studies in Ransomware Attacks on American Companies
REvil
2022-03-24paloalto Netoworks: Unit42Unit42
Threat Brief: Lapsus$ Group
RedLine Stealer
2022-03-24Medium s2wlabS2W TALON
Footsteps of the LAPSUS$ hacking group
2022-03-23EcuCertEcuCert
APT-C-36 Advanced Persistent Threat Campaign Could be present in Ecuador
NjRAT APT-C-36
2022-03-23InfoSec Handlers Diary BlogBrad Duncan
Arkei Variants: From Vidar to Mars Stealer
Arkei Stealer Mars Stealer Oski Stealer Vidar
2022-03-23TrustwaveTrustwave SpiderLabs
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
2022-03-23vmwareSagar Daundkar, Threat Analysis Unit
SysJoker – An Analysis of a Multi-OS RAT
SysJoker SysJoker SysJoker
2022-03-23The Hacker NewsRavie Lakshmanan
abuse mikrotik router by GLUPTEBA malware
Glupteba Proxy Glupteba
2022-03-23PythonBytesIan Hellen
Tracking cyber intruders with Jupyter and Python
2022-03-23MandiantDan Scott, Elias fox, Gary Freas, Jeffery Johnson, Michael Barnhart, Michelle Cantos
Not So Lazarus: Mapping DPRK Cyber Threat Groups to Government Organizations
2022-03-23SecureworksCounter Threat Unit ResearchTeam
GOLD ULRICK Leaks Reveal Organizational Structure and Relationships
Conti Emotet IcedID TrickBot