Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-03-17Bleeping ComputerBill Toulas
ASUS warns of Cyclops Blink malware attacks targeting routers
CyclopsBlink
2022-03-17Bleeping ComputerAx Sharma
BIG sabotage: Famous npm package deletes files to protest Ukraine war
PeaceNotWar
2022-03-14Bleeping ComputerBill Toulas
Android malware Escobar steals your Google Authenticator MFA codes
Aberebot
2022-03-14Bleeping ComputerSergiu Gatlan
New CaddyWiper data wiping malware hits Ukrainian networks
CaddyWiper
2022-03-14Bleeping ComputerBill Toulas
Fake antivirus updates used to deploy Cobalt Strike in Ukraine
Cobalt Strike
2022-03-13Bleeping ComputerBill Toulas
Fake Valorant cheats on YouTube infect you with RedLine stealer
RedLine Stealer
2022-03-11Bleeping ComputerIonut Ilascu
LockBit ransomware gang claims attack on Bridgestone Americas
LockBit
2022-03-10Bleeping ComputerBill Toulas
Corporate website contact forms used to spread BazarBackdoor malware
BazarBackdoor
2022-03-09Bleeping ComputerBill Toulas
Hackers fork open-source reverse tunneling tool for persistence
lsassDumper Sockbot
2022-03-09Bleeping ComputerIonut Ilascu
CISA updates Conti ransomware alert with nearly 100 domain names
BazarBackdoor Cobalt Strike Conti TrickBot
2022-03-07Bleeping ComputerSergiu Gatlan
FBI: Ransomware gang breached 52 US critical infrastructure orgs
RagnarLocker
2022-03-06Bleeping ComputerLawrence Abrams
Mozilla Firefox 97.0.2 fixes two actively exploited zero-day bugs (CVE-2022-26485 & CVE-2022-26486)
2022-03-05Bleeping ComputerLawrence Abrams
Malware now using NVIDIA's stolen code signing certificates
Quasar RAT
2022-03-04Bleeping ComputerBill Toulas
Russia-Ukraine war exploited as lure for malware distribution
Agent Tesla Remcos
2022-03-03Bleeping ComputerBill Toulas
Free decryptor released for HermeticRansom victims in Ukraine
PartyTicket
2022-03-03Bleeping ComputerLawrence Abrams
Malware campaign impersonates VC firm looking to buy sites
2022-03-02Bleeping ComputerBill Toulas
Log4shell exploits now used mostly for DDoS botnets, cryptominers
Kinsing Tsunami BillGates
2022-03-01Bleeping ComputerLawrence Abrams
Conti Ransomware source code leaked by Ukrainian researcher
Conti
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter
2022-02-28Bleeping ComputerSergiu Gatlan
Meta: Ukrainian officials, military targeted by Ghostwriter hackers
Ghostwriter