Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-11-25ResecurityResecurity
@online{resecurity:20221125:in:8e040c2, author = {Resecurity}, title = {{"In The Box" - Mobile Malware Webinjects Marketplace}}, date = {2022-11-25}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/in-the-box-mobile-malware-webinjects-marketplace}, language = {English}, urldate = {2022-12-07} } "In The Box" - Mobile Malware Webinjects Marketplace
Alien Cerberus Coper ERMAC Hydra
2022-09-05ResecurityResecurity
@online{resecurity:20220905:evilproxy:2c76d6b, author = {Resecurity}, title = {{EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web}}, date = {2022-09-05}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/evilproxy-phishing-as-a-service-with-mfa-bypass-emerged-in-dark-web}, language = {English}, urldate = {2022-09-19} } EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web
2022-08-25ResecurityResecurity
@online{resecurity:20220825:covid19:81a9207, author = {Resecurity}, title = {{COVID-19 Data Put For Sale In Dark Web}}, date = {2022-08-25}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/covid-19-data-put-for-sale-in-dark-web}, language = {English}, urldate = {2022-09-19} } COVID-19 Data Put For Sale In Dark Web
2022-08-21ResecurityResecurity
@online{resecurity:20220821:escanor:df2d766, author = {Resecurity}, title = {{Escanor Malware Delivered In Weaponized Microsoft Office Documents}}, date = {2022-08-21}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/escanor-malware-delivered-in-weaponized-microsoft-office-documents}, language = {English}, urldate = {2022-08-28} } Escanor Malware Delivered In Weaponized Microsoft Office Documents
2022-08-19ResecurityResecurity
@online{resecurity:20220819:cybercriminals:945407f, author = {Resecurity}, title = {{Cybercriminals Are Targeting Law Enforcement Agencies Worldwide}}, date = {2022-08-19}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/cybercriminals-are-targeting-law-enforcement-agencies-worldwide}, language = {English}, urldate = {2022-08-28} } Cybercriminals Are Targeting Law Enforcement Agencies Worldwide
2022-08-07ResecurityResecurity
@online{resecurity:20220807:vulnerabilities:d9d2c7f, author = {Resecurity}, title = {{Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples}}, date = {2022-08-07}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/vulnerabilities-in-e-commerce-solutions-hunting-on-big-apples}, language = {English}, urldate = {2022-08-28} } Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples
2022-08-07ResecurityResecurity
@online{resecurity:20220807:logokit:4c57000, author = {Resecurity}, title = {{LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities}}, date = {2022-08-07}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/logokit-update-the-phishing-kit-leveraging-open-redirect-vulnerabilities}, language = {English}, urldate = {2022-08-28} } LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities
2022-07-17ResecurityResecurity
@online{resecurity:20220717:shortcutbased:6cd77fb, author = {Resecurity}, title = {{Shortcut-Based (LNK) Attacks Delivering Malicious Code On The Rise}}, date = {2022-07-17}, organization = {Resecurity}, url = {https://resecurity.com/blog/article/shortcut-based-lnk-attacks-delivering-malicious-code-on-the-rise}, language = {English}, urldate = {2022-07-28} } Shortcut-Based (LNK) Attacks Delivering Malicious Code On The Rise
AsyncRAT BumbleBee Emotet IcedID QakBot
2021-07-07Twitter (@resecurity_com)Resecurity
@online{resecurity:20210707:revil:fb53320, author = {Resecurity}, title = {{Tweet REvil attack chain used against Kaseya}}, date = {2021-07-07}, organization = {Twitter (@resecurity_com)}, url = {https://twitter.com/resecurity_com/status/1412662343796813827}, language = {English}, urldate = {2021-07-24} } Tweet REvil attack chain used against Kaseya
REvil
2019-03-11PacktMelissa Dsouza
@online{dsouza:20190311:resecurity:8388bc5, author = {Melissa Dsouza}, title = {{Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies, and technology companies also targeted.}}, date = {2019-03-11}, organization = {Packt}, url = {https://hub.packtpub.com/resecurity-reports-iriduim-behind-citrix-data-breach-200-government-agencies-oil-and-gas-companies-and-technology-companies-also-targeted/}, language = {English}, urldate = {2020-01-10} } Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies, and technology companies also targeted.
IRIDIUM