Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-14MicrosoftMicrosoft Security Threat Intelligence
New “Prestige” ransomware impacts organizations in Ukraine and Poland
Prestige
2022-10-13Bleeping ComputerSergiu Gatlan
Trend Micro warns of actively exploited Apex One RCE vulnerability (CVE-2022-40139)
2022-10-13Booz Allen HamiltonBooz Allen Hamilton
Same Cloak, More Dagger: Decoding how the People's Republic of China uses Cyberattacks
2022-10-13BlackberryThe BlackBerry Research & Intelligence Team
BianLian Ransomware Encrypts Files in the Blink of an Eye
BianLian
2022-10-12AhnLabASEC
Analysis on Attack Techniques and Cases Using RDP
CreateHiddenAccount
2022-10-12ThreatFabricThreatFabric
TOAD attacks: Vishing combined with Android banking malware now targeting Italian banks
BRATA Copybara Joker
2022-10-12Trend MicroIan Kenefick, Lucas Silva, Nicole Hernandez
Black Basta Ransomware Gang Infiltrates Networks via QAKBOT, Brute Ratel, and Cobalt Strike
Black Basta Brute Ratel C4 Cobalt Strike QakBot
2022-10-12NetresecErik Hjelmvik
IcedID BackConnect Protocol
IcedID
2022-10-11Medium (@DCSO_CyTec)Axel Wauer, Denis Szadkowski, Johann Aydinbas
Tracking down Maggie
Maggie
2022-10-11BleepingComputerBill Toulas
Hacking group POLONIUM uses ‘Creepy’ malware against Israel
DeepCreep MegaCreep Unidentified 097 (Polonium Keylogger)
2022-10-09DataBreaches.netDissent
Johnson Fitness and Wellness hit by DESORDEN Group
Desorden Group
2022-10-07ISCXavier Mertens
Powershell Backdoor with DGA Capability
FTCODE
2022-10-07CheckmarxAviad Gershon, Dor Tumarkin, Jossef Harush, Raphael Silva, Roman Chikunov, Tal Folkman, Yehuda Gelb
LofyGang – Software Supply Chain Attackers; Organized, Persistent, and Operating for Over a Year
LofyGang
2022-10-07YouTube (BSides Portland)Pim Trouerbach
SmokeLoader - The Pandora's box of Tricks
SmokeLoader
2022-10-07Team CymruS2 Research Team
A Visualizza into Recent IcedID Campaigns: Reconstructing Threat Actor Metrics with Pure Signal™ Recon
IcedID PhotoLoader
2022-10-06AonAndre Maccarone, Chapin Bryce, John Ailes
Amazon Web Services: Exploring The Cost Of Exfil
2022-10-06TrellixDaksh Kapur
Evolution of BazarCall Social Engineering Tactics
BazarBackdoor BazarCall
2022-10-06BlackberryThe BlackBerry Research & Intelligence Team
Mustang Panda Abuses Legitimate Apps to Target Myanmar Based Victims
PlugX
2022-10-06CISAFBI, NSA, US-CERT
Alert (AA22-279A) Top CVEs Actively Exploited By People’s Republic of China State-Sponsored Cyber Actors
2022-10-05MicrosoftMicrosoft Security Threat Intelligence
Detecting and preventing LSASS credential dumping attacks