Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-17CTO at NCSCOllie Whitehouse
CTO at NCSC Summary: week ending May 19th
Kimsuky
2024-05-16cybleCyble
New Antidot Android Banking Trojan Masquerading as Fake Google Play Updates
Antidot
2024-05-16AhnLabASEC
Analysis of APT attack cases targeting domestic companies using Dora RAT (Andariel Group)
2024-05-16ElasticDaniel Stepanic, Samir Bousseaden
Spring Cleaning with LATRODECTUS: A Potential Replacement for ICEDID
IcedID Latrodectus
2024-05-16SecurityIntelligenceGolo Mühr, Melissa Frydrych
Grandoreiro banking trojan unleashed: X-Force observing emerging global campaigns
Grandoreiro
2024-05-16SymantecThreat Hunter Team
Springtail: New Linux Backdoor Added to Toolkit
Gomir Kimsuky
2024-05-16ANY.RUNANY.RUN
Malware trend: Latrodectus
Latrodectus
2024-05-15MicrosoftMicrosoft Threat Intelligence
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Black Basta Cobalt Strike QakBot SystemBC
2024-05-15ESET ResearchFilip Jurčacko
To the Moon and back(doors): Lunar landing in diplomatic missions
LunarMail
2024-05-15StairwellThreat Research at Stairwell
Stairwell threat report: Black Basta overview and detection rules
Black Basta Black Basta
2024-05-15X (@bryceabdo)Bryce Abdo
Tweet on UNC5449 exploiting CVE-2024-30051 to deliver QAKBOT
QakBot
2024-05-15Twitter (@embee_research)Embee_research
Revealing Spammer Infrastructure With Passive DNS - 226 Toll-Themed Domains Targeting Australia
2024-05-15MicrosoftMicrosoft Threat Intelligence
Threat actors misusing Quick Assist in social engineering attacks leading to ransomware
Black Basta Cobalt Strike QakBot UNC4393
2024-05-14DarkowlDarkowl
What are CVEs?
Ukrainian Cyber Alliance
2024-05-14NBCDan De Luce, Jean-Nicholas Fievet
China-linked group uses malware to try to spy on commercial shipping, new report says
2024-05-14YouTube (botconf eu)Yassir Laaouissi
Panni pelmeni: Turla loves dumplings
Pelmeni
2024-05-14Bern University of Applied ScienceBenjamin Fehrensen, Dominic Schmutz, Robin Rapp
Forensic analysis of hook Android malware
Hook
2024-05-14Check Point ResearchAntonis Terefos, Tera0017
Foxit PDF “Flawed Design” Exploitation
Rafel RAT Agent Tesla AsyncRAT DCRat DONOT Nanocore RAT NjRAT Pony Remcos Venom RAT XWorm
2024-05-14KasperskyBoris Larin, Mert Degirmenci
QakBot attacks with Windows zero-day (CVE-2024-30051)
Cobalt Strike QakBot
2024-05-14ESET ResearchMarc-Etienne M.Léveillé
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
Ebury