Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-10-27vmwareTakahiro Haruyama
Threat Analysis: Active C2 Discovery Using Protocol Emulation Part3 (ShadowPad)
ShadowPad
2022-10-27MicrosoftMicrosoft Threat Intelligence
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity
FAKEUPDATES BumbleBee Clop Fauppod Raspberry Robin Roshtyak Silence DEV-0950 Mustard Tempest
2022-10-27MicrosoftMicrosoft Security Threat Intelligence
Raspberry Robin worm part of larger ecosystem facilitating pre-ransomware activity
FAKEUPDATES BumbleBee Fauppod PhotoLoader Raspberry Robin Roshtyak
2022-10-27Bleeping ComputerSergiu Gatlan
Microsoft links Raspberry Robin worm to Clop ransomware attacks
Clop Raspberry Robin
2022-10-27Bleeping ComputerBill Toulas
Fodcha DDoS botnet reaches 1Tbps in power, injects ransoms in packets
Fodcha
2022-10-26FlashpointFlashpoint
Pro-Kremlin Hacktivist Groups Seeking Impact By Courting Notoriety
RaHDit
2022-10-26CrowdStrikeManoj Ahuje
CrowdStrike Identifies New Kiss-a-Dog Cryptojacking Campaign Targeting Vulnerable Docker and Kubernetes Infrastructure
xmrig Kiss-a-Dog
2022-10-25MicrosoftMicrosoft Security Threat Intelligence
DEV-0832 (Vice Society) opportunistic ransomware campaigns impacting US education sector
BlackCat Mount Locker PortStarter Zeppelin Vanilla Tempest
2022-10-25VMware Threat Analysis UnitTakahiro Haruyama
Tracking the entire iceberg: long-term APT malware C2 protocol emulation and scanning
ShadowPad Winnti
2022-10-24AhnLabASEC Analysis Team
Malware infection case of Lazarus attack group that neutralizes antivirus program with BYOVD technique
FudModule LazarDoor Racket Downloader
2022-10-23BlackberryThe BlackBerry Research & Intelligence Team
Unattributed RomCom Threat Actor Spoofing Popular Apps Now Hits Ukrainian Militaries
ROMCOM RAT RomCom
2022-10-21ZscalerAvinash Kumar, Niraj Shivtarkar
WarHawk: the New Backdoor in the Arsenal of the SideWinder APT Group
WarHawk
2022-10-21SymantecThreat Hunter Team
Exbyte: BlackByte Ransomware Attackers Deploy New Exfiltration Tool
ExByte
2022-10-20cybleCyble Research Labs
New Temp Stealer Spreading Via Free & Cracked Software
TempStealer
2022-10-20Bleeping ComputerBill Toulas
Hacking group updates Furball Android spyware to evade detection
FurBall
2022-10-17Malversegreenplan
Stack String Decryption with Ghidra Emulator (Orchard)
Orchard
2022-10-14MicrosoftMicrosoft Security Threat Intelligence
New “Prestige” ransomware impacts organizations in Ukraine and Poland
Prestige
2022-10-13Bleeping ComputerSergiu Gatlan
Trend Micro warns of actively exploited Apex One RCE vulnerability (CVE-2022-40139)
2022-10-13Booz Allen HamiltonBooz Allen Hamilton
Same Cloak, More Dagger: Decoding how the People's Republic of China uses Cyberattacks
2022-10-13BlackberryThe BlackBerry Research & Intelligence Team
BianLian Ransomware Encrypts Files in the Blink of an Eye
BianLian