Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-18Positive TechnologiesPTSecurity
Space Pirates: a look into the group's unconventional techniques, new attack vectors, and tools
Voidoor
2023-07-18Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
NemesisProject
Nemesis
2023-07-17FlashpointFlashpoint
The New Release of Danabot Version 3: What You Need to Know
DanaBot
2023-07-17SecurityScorecardVlad Pasca
A technical analysis of the Quasar-forked RAT called VoidRAT
VoidRAT
2023-07-16Perception PointIgal Lytzki
Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators
Mispadu
2023-07-15MSSP Labcocomelonc
Malware source code investigation: BlackLotus - part 1
BlackLotus
2023-07-14Trend MicroDaniel Lunghi
Possible Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad
ShadowPad DriftingCloud Tonto Team
2023-07-14MicrosoftMicrosoft Threat Intelligence
Analysis of Storm-0558 techniques for unauthorized email access
Storm-0558
2023-07-14ProofpointThreat Insight
Tweets on Discovery of WikiLoader
WikiLoader
2023-07-13Rapid7 LabsNatalie Zargarov
Old Blackmoon Trojan, NEW Monetization Approach
KrBanker
2023-07-13MSSP Labcocomelonc
Malware analysis report: BlackCat ransomware
BlackCat BlackCat
2023-07-12SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
CustomerLoader: a new malware distributing a wide variety of payloads
CustomerLoader
2023-07-12Palo Alto Networks Unit 42Unit 42
Diplomats Beware: Cloaked Ursa Phishing With a Twist
GraphDrop
2023-07-12JPCERT/CCYuma Masubuchi
DangerousPassword attacks targeting developers' Windows, macOS, and Linux environments
2023-07-12Palo Alto Networks Unit 42Unit 42
Diplomats Beware: Cloaked Ursa Phishing With a Twist
2023-07-12Lab52Lab52
New invitation from APT29 to use CCleaner
Unidentified 107 (APT29)
2023-07-12DragosDragos
Mitigating CVE-2023-3595 and CVE-2023-3596 Impacting Rockwell Automation ControlLogix Firmware
2023-07-11GoogleNg Choon Kiat, Rommel Joven
The Spies Who Loved You: Infected USB Drives to Steal Secrets
FROZENHILL
2023-07-11sysdigAlessandro Brucato
SCARLETEEL 2.0: Fargate, Kubernetes, and Crypto
SCARLETEEL
2023-07-11AhnLabASEC
Analysis of the Rekoobe Backdoor Being Used In Attacks Against Linux Systems in Korea
Rekoobe