Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl
2024-02-01Cado SecurityTara Gould
From the Depths: Analyzing the Cthulhu Stealer Malware for macOS
Cthulhu Stealer
2021-10-06AnomaliTara Gould
Inside TeamTNT’s Impressive Arsenal: A Look Into A TeamTNT Server
TeamTNT
2021-09-02AnomaliGage Mele, Rory Gould, Sean Townsend, Tara Gould
Cybercrime Group FIN7 Using Windows 11 Alpha-Themed Docs to Drop Javascript Backdoor
2021-05-13AnomaliGage Mele, Tara Gould
Threat Actors Use MSBuild to Deliver RATs Filelessly
Remcos
2021-04-19AnomaliGage Mele, Tara Gould, Yury Polozov
PRIMITIVE BEAR (Gamaredon) Targets Ukraine with Timely Themes
2021-03-31AnomaliGage Mele, Tara Gould, Winston Marydasan, Yury Polozov
Bahamut Possibly Responsible for Multi-Stage Infection Chain Campaign