Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-08Team CymruS2 Research Team
Iranian Exploitation Activities Continue as of November 2022
2022-12-08CybleincCyble
Mallox Ransomware showing signs of Increased Activity
TargetCompany
2022-12-08Cisco TalosTiago Pereira
Breaking the silence - Recent Truebot activity
Clop Cobalt Strike FlawedGrace Raspberry Robin Silence Teleport
2022-12-08ThreatFabricThreatFabric
Zombinder: new obfuscation service used by Ermac, now distributed next to desktop stealers
ERMAC Xenomorph
2022-12-07KnowBe4Stu Sjouwerman
Russian Threat Actor Impersonates Aerospace and Defense Companies
2022-12-07MorphisecMorphisec Labs
New Babuk Ransomware Found in Major Attack
Babuk
2022-12-07GoogleBenoit Sevens, Clement Lecigne
Internet Explorer 0-day exploited by North Korean actor APT37
2022-12-07ESET ResearchAdam Burgher
Fantasy – a new Agrius wiper deployed through a supply‑chain attack
Apostle DEADWOOD
2022-12-07cybleCyble
A Closer Look At BlackMagic Ransomware
BlackMagic
2022-12-06BitdefenderMartin Zugec, Victor Vrabie
Deep Dive Into a BackdoorDiplomacy Attack – A Study of an Attacker’s Toolkit
2022-12-06Lacework LabsLacework Labs
AndroxGh0st – the python malware exploiting your AWS keys
AndroxGh0st Xcatze
2022-12-06Twitter (@URSNIFleak)URSNIFleak
Twitter account with leaked data about the group behind URSNIF
RM3
2022-12-06360 Threat Intelligence Center360 Beacon Lab
Analysis of suspected APT-C-56 (Transparent Tribe) attacks against terrorism
AhMyth Meterpreter SpyNote AsyncRAT
2022-12-06BlackberryBlackBerry Research & Intelligence Team
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
PlugX
2022-12-05AccenturePaul Mansfield, Thomas Willkan
Popularity spikes for information stealer malware on the dark web
MetaStealer Rhadamanthys
2022-12-05KISAKrCERT
TTPs#9: Analyzing the attack strategy monitoring the daily life of individuals
Chinotto
2022-12-05Human Rights WatchHuman Rights Watch
Iran: State-Backed Hacking of Activists, Journalists, Politicians
2022-12-02K7 SecurityRahul R
KoiVM Loader Resurfaces With a Bang
KoiVM
2022-12-01splunkSplunk Threat Research Team
From Macros to No Macros: Continuous Malware Improvements by QakBot
QakBot
2022-12-01ZscalerZscaler
Back in Black... Basta - Technical Analysis of BlackBasta Ransomware 2.0
Black Basta