Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-16Twitter (@ESETresearch)Dominik Breitenbacher, Peter Kálnai
Twitter thread about Operation In(ter)ception for macOS
Interception
2022-08-16KasperskyIgor Kuznetsov, Leonid Bezvershenko
Two more malicious Python packages in the PyPI
W4SP Stealer
2022-08-15MicrosoftDigital Threat Analysis Center (DTAC), Microsoft Threat Intelligence Center (MSTIC), Office 365 Threat Research Team
Disrupting SEABORGIUM’s ongoing phishing operations
Callisto
2022-08-15AccidentalRebelKarlo Licudine
Malware sandbox evasion in x64 assembly by checking ram size - Part 2
2022-08-15SentinelOneVikram Navali
Detecting a Rogue Domain Controller – DCShadow Attack
MimiKatz TrickBot
2022-08-15WeixinKnow Chuangyu
Analysis of the characteristics of new activities organized by Patchwork APT in South Asia
2022-08-15F5 LabsAditya K. Sood, David Warburton, Malcolm Heath, Sander Vinberg
BlackGuard Infostealer Malware: Dissecting the State of Exfiltrated Data
BlackGuard
2022-08-15MicrosoftDigital Threat Analysis Center (DTAC), Microsoft Threat Intelligence Center (MSTIC), Office 365 Threat Research Team
Disrupting SEABORGIUM’s ongoing phishing operations
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-15SecurityScorecardVlad Pasca
A Deep Dive Into Black Basta Ransomware
Black Basta
2022-08-13AlienVault OTXAlienVault
An Analysis of Infrastructure linked to the Hagga Threat Actor
Hagga
2022-08-13SilentpushSilent Push
Early Analysis of the Twilio phishing attack-it is the tip of the iceberg
2022-08-12CrowdStrikeIoan Iacob, Iulian Madalin Ionita
The Anatomy of Wiper Malware, Part 1: Common Techniques
Apostle CaddyWiper DEADWOOD DistTrack DoubleZero DUSTMAN HermeticWiper IsaacWiper IsraBye KillDisk Meteor Olympic Destroyer Ordinypt Petya Sierra(Alfa,Bravo, ...) StoneDrill WhisperGate ZeroCleare
2022-08-12Trend MicroDaniel Lunghi, Jaromír Hořejší
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users
Rshell HyperBro Earth Berberoka
2022-08-12Trend MicroDaniel Lunghi, Jaromír Hořejší
Iron Tiger Compromises Chat Application Mimi, Targets Windows, Mac, and Linux Users (IOCs)
HyperBro
2022-08-12SekoiaThreat & Detection Research Team
LuckyMouse uses a backdoored Electron app to target MacOS
HyperBro
2022-08-11AccentureAccenture
How cybercriminals are weaponizing leaked ransomware data for follow-up attacks
2022-08-11Medium walmartglobaltechJason Reaves
State of the Remote Access Tools, Part 1
2022-08-11SecurityScorecardRobert Ames
The Increase in Ransomware Attacks on Local Governments
BlackCat BlackCat Cobalt Strike LockBit
2022-08-11xanhacks' infosec blogxanhacks
MoqHao Android malware analysis and phishing campaign
MoqHao