Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-08-03KasperskyKaspersky
What’s happening in the world of crimeware: Emotet, DarkGate and LokiBot
LokiBot DarkGate Emotet
2023-08-03DARKReadingNate Nelson
Russian APT 'BlueCharlie' Swaps Infrastructure to Evade Detection
Callisto
2023-08-02Recorded FutureInsikt Group
BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023
Callisto
2023-08-02CheckmarxYehuda Gelb
Lazarus Group Launches First Open Source Supply Chain Attacks Targeting Crypto Sector
2023-08-02Medium (@morimolymoly)morimolymoly
HUI Loader — Malware Analysis Note
HUI Loader
2023-08-02Recorded FutureInsikt Group
BlueCharlie, Previously Tracked as TAG 53, Continues to Deploy New Infrastructure in 2023
2023-08-02Recorded FutureInsikt Group
BlueCharlie, Previously Tracked as TAG-53, Continues to Deploy New Infrastructure in 2023
2023-08-02MicrosoftMicrosoft Threat Intelligence
Midnight Blizzard conducts targeted social engineering over Microsoft Teams
UNC2452
2023-08-01Infinitum ITKerime Gencay
White Snake Stealer Analysis Report (Paywall)
WhiteSnake Stealer
2023-08-01Qianxin Threat Intelligence CenterRed Raindrop Team
Analysis of Recent Activities of the Mylobot Botnet
MyloBot
2023-08-01ANALYST1Jon DiMaggio
Ransomware Diaries: Volume 3 – LockBit’s Secrets
LockBit
2023-08-01Palo Alto Networks Unit 42Lior Rochberger
NodeStealer 2.0 – The Python Version: Stealing Facebook Business Accounts
BitRAT NodeStealer XWorm
2023-08-01eSentireeSentire Threat Response Unit (TRU)
BatLoader Continues Signed MSIX App Package Abuse
BATLOADER
2023-08-01LinkedIn (PRODAFT)PRODAFT
An organic relationship between the #Rhysida and #ViceSociety ransomware teams
Rhysida
2023-08-01AhnLabASEC
Sliver C2 Being Distributed Through Korean Program Development Company
Sliver
2023-08-01SentinelOneTom Hegel
Illicit Brand Impersonation | A Threat Hunting Approach
2023-07-31Github (Im4wasp)Im4wasp
Github Repo for W4SP-Stealer-V2
W4SP Stealer
2023-07-31Cado SecurityMatt Muir, Nate Bill
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect
P2Pinfect
2023-07-31Medium (csg-govtech)Greg Jefferson
China-Backed Hackers Threaten Texas Military Sites, Utilities
2023-07-31ProofpointKelsey Merriman, Pim Trouerbach
Out of the Sandbox: WikiLoader Digs Sophisticated Evasion
ISFB WikiLoader