Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-23SecurityAffairsPierluigi Paganini
It’s official, Lapsus$ gang compromised a Microsoft employee’s account
RedLine Stealer
2022-03-23Security BoulevardRajdeepsinh Dodia
Midas Ransomware : Tracing the Evolution of Thanos Ransomware Variants
Hakbit Midas
2022-03-23Team CymruAndy Kraus, Brian Eckman, Josh Hopkins, Paul Welte
Raccoon Stealer – An Insight into Victim “Gates”
Raccoon
2022-03-23ZscalerRajdeepsinh Dodia
Midas Ransomware : Tracing the Evolution of Thanos Ransomware Variants
Hakbit Midas
2022-03-23FortinetShunichi Imano, Val Saengphaibul
Bad Actors Trying to Capitalize on Current Events via Shameless Email Scams
Emotet
2022-03-23FortinetXiaopeng Zhang
MS Office Files Involved Again in Recent Emotet Trojan Campaign – Part II
Emotet
2022-03-23BleepingComputerBill Toulas
New Mustang Panda hacking campaign targets diplomats, ISPs
PlugX
2022-03-23QianxinRed Raindrop Team
Analysis of Attack Activity of PROMETHIUM Disguised
StrongPity
2022-03-23InfoSec Handlers Diary BlogBrad Duncan
Arkei Variants: From Vidar to Mars Stealer
Arkei Stealer Mars Stealer Vidar
2022-03-23ESET ResearchAlexandre Côté Cyr
Mustang Panda’s Hodur: Old tricks, new Korplug variant
Hodur PlugX
2022-03-23MSSPAlertD. Howard Kass
LokiLocker Ransomware May Use False Flag to Avoid Identification
LokiLocker
2022-03-23KrebsOnSecurityBrian Krebs
A Closer Look at the LAPSUS$ Data Extortion Group
RedLine Stealer
2022-03-23NVISO LabsBart Parys
Hunting Emotet campaigns with Kusto
Emotet
2022-03-23Intel 471Intel 471
Conti puts the ‘organized’ in organized crime
Conti
2022-03-22JPCERT/CCJSAC
JSAC 2022 -Day 1-
BlackTech
2022-03-22MicrosoftMicrosoft Incident Response, Microsoft Threat Intelligence
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction
LAPSUS
2022-03-22MicrosoftDetection and Response Team (DART), Microsoft 365 Defender Threat Intelligence Team, Microsoft Threat Intelligence Center (MSTIC)
DEV-0537 (UNC3661) criminal actor targeting organizations for data exfiltration and destruction
RedLine Stealer LAPSUS
2022-03-22Rewterz Information SecurityRewterz Information Security
Russian-Ukrainian Cyber Warfare – Rewterz Threat Intelligence Rollup
NB65
2022-03-22Avast DecodedIgor Morgenstern, Jan Holman, Luigino Camastra
Operation Dragon Castling: APT group targeting betting companies
FormerFirstRAT MulCom TianWu
2022-03-22TrustwaveKarla Agregado
Dissecting a Phishing Campaign with a Captcha-based URL