Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-08Medium (Cryptax)Axelle Apvrille
Live reverse engineering of a trojanized medical app — Android/Joker
Joker
2022-03-08SpringerChristian Hummert, Dirk Pawlaszczyk
Mobile Forensics – The File Format Handbook
2022-03-08Team CymruJames Shank
Record breaking DDoS Potential Discovered: CVE-2022-26143
2022-03-08SecureworksCounter Threat Unit ResearchTeam
Excel Add-ins Deliver JSSLoader Malware
JSSLoader
2022-03-08Recorded FutureInsikt Group®
The Media Environment and Domestic Public Opinion in China Toward Russia’s War On Ukraine
2022-03-08Twitter (@CyberJack42)CyberJack
Tweet on ELFSHELF alias for KEYPLUG
KEYPLUG
2022-03-08MBSDMBSD
ContiLeaks
Conti
2022-03-08SymantecThreat Hunter Team
Daxin Backdoor: In-Depth Analysis, Part One
Daxin
2022-03-08LumenBlack Lotus Labs
What Global Network Visibility Reveals about the Resurgence of One of the World’s Most Notorious Botnets
Emotet
2022-03-08YoroiCarmelo Ragusa, Luca Mella, Luigi Martire
Conti Ransomware source code: a well-designed COTS ransomware
Conti
2022-03-08The RecordDina Temple-Raston
Inside Conti leaks: The Panama Papers of ransomware
Conti
2022-03-08Cluster25Cluster25
GhostWriter / UNC1151 adopts MicroBackdoor Variants in Cyber Operations against Ukraine
MicroBackdoor
2022-03-08Trend MicroCedric Pernet, Jaromír Hořejší
New RURansom Wiper Targets Russia
RURansom
2022-03-08Github (whichbuffer)Arda Büyükkaya
Conti-Ransomware-IOC
Conti
2022-03-08Twitter (@ShaneHuntley)Google Threat Analysis Group, Shane Huntley
Tweet on APT31 phishing campaign targeting high profile Gmail users affiliated with the U.S. government in February
2022-03-08CyleraCylera
The link between Kwampirs (Orangeworm) and Shamoon APTs
DistTrack Kwampirs
2022-03-08MandiantDouglas Bienstock, Geoff Ackerman, John Wolfram, Rufus Brown, Van Ta
Does This Look Infected? A Summary of APT41 Targeting U.S. State Governments
KEYPLUG Cobalt Strike LOWKEY
2022-03-08Twitter (@struppigel)Karsten Hahn
Tweet on KazyLoader
KazyLoader
2022-03-07LAC WATCHCyber ​​Emergency Center
I CAN'T HEAR YOU NOW! INTERNAL BEHAVIOR OF INFORMATION-STEALING MALWARE AND JSOC DETECTION TRENDS
Xloader Agent Tesla Formbook Loki Password Stealer (PWS)
2022-03-07Check Point ResearchCheck Point
Lapsus$ Ransomware gang uses stolen source code to disguise malware files as trustworthy. Check Point customers remain protected
LAPSUS