Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-02-17CloudsekAnandeshwar Unnikrishnan, Hansika Saxena
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 2)
Blister
2022-02-15SophosMatthew Everts, Stephen McNally
Vulnerable Exchange server hit by Squirrelwaffle and financial fraud
Squirrelwaffle
2022-02-15The Hacker NewsRavie Lakshmanan
Researchers Link ShadowPad Malware Attacks to Chinese Ministry and PLA
ShadowPad
2022-02-09The Hacker NewsRavie Lakshmanan
Iranian Hackers Using New Marlin Backdoor in 'Out to Sea' Espionage Campaign
2022-02-08The Hacker NewsRavie Lakshmanan
Palestinian Hackers Use New NimbleMamba Implant in Recent Attacks
NimbleMamba
2022-02-06The Hacker NewsRavie Lakshmanan
Chinese Hackers Target Taiwanese Financial Institutions with a new Stealthy Backdoor
xPack
2022-02-03SymantecSymantec Threat Hunter Team
Antlion: Chinese APT Uses Custom Backdoor to Target Financial Institutions in Taiwan
MimiKatz xPack Antlion
2022-01-27The Hacker NewsRavie Lakshmanan
Widespread FluBot and TeaBot Malware Campaigns Targeting Android Devices
Anatsa FluBot
2022-01-26zimperiumAazim Yaswant
Financially Motivated Mobile Scamware Exceeds 100M Installations
2022-01-26The Hacker NewsRavie Lakshmanan
Hackers Using New Evasive Technique to Deliver AsyncRAT Malware
AsyncRAT
2022-01-25BluelivBlueliv
Cyber Threat Intelligence for Banking & Financial Services FOLLOW THE MONEY
2022-01-20Trend MicroFernando Mercês, Stephen Hilt
Backing Your Backup Defending NAS Devices Against Evolving Threats
QNAPCrypt QSnatch
2022-01-19ChainanalysisChainalysis Team
Meet the Malware Families Helping Hackers Steal and Mine Millions in Cryptocurrency
Glupteba RedLine Stealer
2022-01-19MandiantAdrian Sanchez Hernandez, Ervin James Ocampo, Paul Tarter
One Source to Rule Them All: Chasing AVADDON Ransomware
BlackMatter Avaddon BlackMatter MedusaLocker SystemBC ThunderX
2022-01-12CiscoChetan Raghuprasad, Vanja Svajcer
Nanocore, Netwire and AsyncRAT spreading campaign uses public cloud infrastructure
AsyncRAT Nanocore RAT NetWire RC
2022-01-07CloudsekAnandeshwar Unnikrishnan, Deepanjli Paulraj
Technical Analysis of Code-Signed “Blister” Malware Campaign (Part 1)
Blister
2022-01-05SYGNIAAmnon Kushnir, Arie Zilberstein, Boaz Wasserman, Itay Shohat, Noam Lifshitz, Oren Biderman, Yoav Mazor
Elephant Beetle: Uncovering an Organized Financial-Theft Operation
FIN13
2022-01-04SYGNIASygnia Incident Response Team
TG2003: Elephant Beetle - Uncovering an Organized Financial-theft Operation
FIN13
2021-12-30CloudsekAnandeshwar Unnikrishnan, Isha Tripathi
Technical Analysis of Khonsari Ransomware Campaign Exploiting the Log4Shell Vulnerability
Khonsari
2021-12-22CloudsekAnandeshwar Unnikrishnan
Emotet 2.0: Everything you need to know about the new Variant of the Banking Trojan
Emotet