Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-24CybleincCyble
Coper Banking Trojan: Android Malware Posing As Google Play Store App Installer
Coper ExoBot
2022-03-24GoogleAdam Weidemann, Google Threat Analysis Group
Countering threats from North Korea
2022-03-24KasperskyAnton Yatsenko, Olga Svistunova
Phishing-kit market: what’s inside “off-the-shelf” phishing packages
2022-03-24ESET ResearchLukáš Štefanko
Crypto malware in patched wallets targeting Android and iOS devices
2022-03-24Threat PostNate Nelson
Microsoft Help Files Disguise Vidar Malware
Vidar
2022-03-24CSO OnlineJon Gold
Microsoft help files repurposed to contain Vidar malware in new campaign
Vidar
2022-03-24TrustwaveDiana Lopera
Vidar Malware Launcher Concealed in Help File
Vidar
2022-03-24Cyber Security NewsGurubaran
GIMMICK Malware Attacks macOS to Attack Organizations Across Asia
GIMMICK
2022-03-24Bleeping ComputerBill Toulas
Malicious Microsoft Excel add-ins used to deliver RAT malware
JSSLoader
2022-03-24NextGovBrandi Vincent
Ukrainian Cyber Lead Says ‘At Least 4 Types of Malware’ in Use to Target Critical Infrastructure and Humanitarian Aid
CaddyWiper DoubleZero HermeticWiper IsaacWiper
2022-03-24Recorded FutureInsikt Group
IsaacWiper Continues Trend of Wiper Attacks Against Ukraine
IsaacWiper
2022-03-24United States SenateU.S. Senate Committee on Homeland Security & Governmental Affairs
New Portman Report Demonstrates Threat Ransomware Presents to the United States
REvil
2022-03-24United States SenateU.S. Senate Committee on Homeland Security & Governmental Affairs
America's Data Held Hostage: Case Studies in Ransomware Attacks on American Companies
REvil
2022-03-24paloalto Netoworks: Unit42Unit42
Threat Brief: Lapsus$ Group
RedLine Stealer
2022-03-24Medium s2wlabS2W TALON
Footsteps of the LAPSUS$ hacking group
2022-03-23EcuCertEcuCert
APT-C-36 Advanced Persistent Threat Campaign Could be present in Ecuador
NjRAT APT-C-36
2022-03-23InfoSec Handlers Diary BlogBrad Duncan
Arkei Variants: From Vidar to Mars Stealer
Arkei Stealer Mars Stealer Oski Stealer Vidar
2022-03-23TrustwaveTrustwave SpiderLabs
Trustwave’s Action Response: The Lapsus$ Hacker Group Shows Us the Importance of Securing the Digital Supply Chain
2022-03-23vmwareSagar Daundkar, Threat Analysis Unit
SysJoker – An Analysis of a Multi-OS RAT
SysJoker SysJoker SysJoker
2022-03-23The Hacker NewsRavie Lakshmanan
abuse mikrotik router by GLUPTEBA malware
Glupteba Proxy Glupteba