Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-22eSentireeSentire Threat Response Unit (TRU)
IcedID to Cobalt Strike In Under 20 Minutes
Cobalt Strike IcedID PhotoLoader
2022-02-22USENIXAndrea Marcelli, Davide Balzarotti, Mariano Graziano, Mohamad Mansouri, Xabier Ugarte-Pedrero, Yanick Fratantonio
How Machine Learning Is Solving the Binary Function Similarity Problem
2022-02-22CyberIntShmuel Gihon
Like Father Like Son? New Mars Stealer
Mars Stealer Oski Stealer
2022-02-22SophosChester Wisniewski
Cyberthreats during Russian-Ukrainian tensions: what can we learn from history to be prepared?
Conti
2022-02-22ZeroFoxStephan Simon
Quick Update: Kraken Completes Its Rebrand to Anubis
Anubis Loader
2022-02-22CrowdStrikeAspen Lindblom, Joseph Goodwin
CrowdStrike Research Investigates Exploit Behavior to Strengthen Customer Protection
2022-02-22Palo Alto Networks Unit 42Unit 42
Russia-Ukraine Crisis: How to Protect Against the Cyber Impact
HermeticWiper
2022-02-22Pangu LabPangu Lab
Bvp47 - Top-tier Backdoor of US NSA Equation Group
Bvp47
2022-02-22Bleeping ComputerBill Toulas
Vulnerable Microsoft SQL Servers targeted with Cobalt Strike
Cobalt Strike Kingminer Lemon Duck
2022-02-22Trend MicroTrend Micro Research
Ransomware Spotlight: Clop
Clop
2022-02-22Bankinfo SecurityMatthew J. Schwartz
Cybercrime Moves: Conti Ransomware Absorbs TrickBot Malware
Conti TrickBot
2022-02-22CyCraft Technology Corp
China Implicated in Prolonged Supply Chain Attack Targeting Taiwan Financial Sector
Quasar RAT
2022-02-22NCSC SwitzerlandNCSC Switzerland
Week 7: Supposed order confirmation delivers malware and new variants in fake extortion emails
AsyncRAT
2022-02-21AhnLabAhnLab ASEC Analysis Team
Modified CryptBot Infostealer Being Distributed
CryptBot
2022-02-21BrandefenseBrandefense
Darkside Ransomware Analysis Report
DarkSide
2022-02-21ASECASEC
New information takeover malware "ColdStealer" is being distributed
ColdStealer
2022-02-21Windows ReportAlexandru Poloboc
Watch out, the Kraken botnet can easily bypass Defender and steal your crypto
Anubis Loader
2022-02-21CyCraftCyCraft AI
An in-depth analysis of the Operation Cache Panda organized supply chain attack on Taiwan's financial industry
Quasar RAT
2022-02-21ASEC
Cobalt Strike Being Distributed to Vulnerable MS-SQL Servers
Cobalt Strike Lemon Duck
2022-02-21PICUS SecurityHüseyin Can YÜCEEL
TTPs used by BlackByte Ransomware Targeting Critical Infrastructure
BlackByte