Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-03-14Check Point ResearchBohdan Melnykov, Raman Ladutska
South Korean Android Banking Menace - Fakecalls
Fakecalls
2023-03-14ESET ResearchFacundo Muñoz
The slow Tick‑ing time bomb: Tick APT group compromise of a DLP software developer in East Asia
2023-03-14GoogleBenoit Sevens
Magniber ransomware actors used a variant of Microsoft SmartScreen bypass
Magniber
2023-03-14BlackberryBlackBerry Research & Intelligence Team
NOBELIUM Uses Poland's Ambassador’s Visit to the U.S. to Target EU Governments Assisting Ukraine
EnvyScout GraphicalNeutrino
2023-03-13SentinelOneJim Walter
CatB Ransomware | File Locker Sharpens Its Claws to Steal Data with MSDTC Service DLL Hijacking
CatB
2023-03-09DeepInstinctSimon Kenin
DUCKTAIL: Threat Operation Re-emerges with New LNK, PowerShell, and Other Custom Tactics to Avoid Detection
DUCKTAIL
2023-03-09SophosGabor Szappanos
A border-hopping PlugX USB worm takes its act on the road
PlugX
2023-03-09binarlyAleksandr Matrosov
The Untold Story of the BlackLotus UEFI Bootkit
BlackLotus
2023-03-09State Service of Special Communication and Information Protection of Ukraine (CIP)
Russia's Cyber Tactics: Lessons Learned 2022
2023-03-09VulnCheckJacob Baines
The VulnCheck 2022 Exploited Vulnerability Report - Missing CISA KEV Catalog Entries
2023-03-09Cyble
BlackSnake Ransomware Emerges from Chaos Ransomware’s Shadow
BlackSnake
2023-03-07Check Point ResearchCheck Point Research
Pandas with a Soul: Chinese Espionage Attacks Against Southeast Asian Government Entities
5.t Downloader 8.t Dropper Soul
2023-03-07BleepingComputerLawrence Abrams
Emotet malware attacks return after three-month break
Emotet
2023-03-06LumenBlack Lotus Labs
New HiatusRAT Router Malware Covertly Spies On Victims
HiatusRAT
2023-03-02ESET ResearchAlexandre Côté Cyr
MQsTTang: Mustang Panda’s latest backdoor treads new ground with Qt and MQTT
MQsTTang
2023-03-02Wiz.ioAmitai Cohen, Barak Sharoni
Redirection Roulette: Thousands of hijacked websites in East Asia redirecting visitors to other sites
2023-03-02ThreatMonThreatMon Malware Research Team
Behind the Breaches: Mapping Threat Actors and Their CVE Exploits
2023-03-01Medium SarvivaMalwareAnalystsarviya
SecTopRAT: A Dangerous Remote Access Trojan Spreading Through Google Fake Ads
SectopRAT
2023-03-01ESET ResearchMartin Smolár
BlackLotus UEFI bootkit: Myth confirmed
BlackLotus
2023-02-28UptycsUptycs Threat Research
Cryptocurrency Entities at Risk: Threat Actor Uses Parallax RAT for Infiltration
Parallax RAT