Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-30Bleeping ComputerBill Toulas
Phishing campaign targets Russian govt dissidents with Cobalt Strike
Unidentified PS 002 (RAT) Cobalt Strike
2022-03-30Bleeping ComputerBill Toulas
Hive ransomware uses new 'IPfuscation' trick to hide payload
Hive
2022-03-29Bleeping ComputerBill Toulas
Hackers use modified MFA tool against Indian govt employees
Crimson RAT Oblique RAT
2022-03-28Bleeping ComputerBill Toulas
Microsoft Exchange targeted for IcedID reply-chain hijacking attacks
IcedID
2022-03-28Bleeping ComputerBill Toulas
SunCrypt ransomware is still alive and kicking in 2022
SunCrypt
2022-03-24Bleeping ComputerBill Toulas
Malicious Microsoft Excel add-ins used to deliver RAT malware
JSSLoader
2022-03-23BleepingComputerBill Toulas
New Mustang Panda hacking campaign targets diplomats, ISPs
PlugX
2022-03-21Bleeping ComputerBill Toulas
Serpent malware campaign abuses Chocolatey Windows package manager
Serpent
2022-03-21Bleeping ComputerBill Toulas
BitRAT malware now spreading as a Windows 10 license activator
BitRAT
2022-03-17Bleeping ComputerBill Toulas
New Unix rootkit used to steal ATM banking data
2022-03-17Bleeping ComputerBill Toulas
ASUS warns of Cyclops Blink malware attacks targeting routers
CyclopsBlink
2022-03-14Bleeping ComputerBill Toulas
Android malware Escobar steals your Google Authenticator MFA codes
Aberebot
2022-03-14Bleeping ComputerBill Toulas
Fake antivirus updates used to deploy Cobalt Strike in Ukraine
Cobalt Strike
2022-03-13Bleeping ComputerBill Toulas
Fake Valorant cheats on YouTube infect you with RedLine stealer
RedLine Stealer
2022-03-10Bleeping ComputerBill Toulas
Corporate website contact forms used to spread BazarBackdoor malware
BazarBackdoor
2022-03-09Bleeping ComputerBill Toulas
Hackers fork open-source reverse tunneling tool for persistence
lsassDumper Sockbot
2022-03-04Bleeping ComputerBill Toulas
Russia-Ukraine war exploited as lure for malware distribution
Agent Tesla Remcos
2022-03-03Bleeping ComputerBill Toulas
Free decryptor released for HermeticRansom victims in Ukraine
PartyTicket
2022-03-02Bleeping ComputerBill Toulas
Log4shell exploits now used mostly for DDoS botnets, cryptominers
Kinsing Tsunami BillGates
2022-02-28Bleeping ComputerBill Toulas
Chinese cyberspies target govts with their ‘most advanced’ backdoor
Daxin