Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-12kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] The Xworm malware is being spread through a phishing email
XWorm
2024-09-10ReversingLabsKarlo Zanki
Fake recruiter coding tests target devs with malicious Python packages
2024-09-10Talos IntelligenceJoey Chen
DragonRank, a Chinese-speaking SEO manipulator service provider
IISpy PlugX
2024-09-10ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ailurophile Stealer Technical Malware Analysis Report
2024-09-09LinkedIn (Idan Tarab)Idan Tarab
APT CoralRaider Expands Arsenal: AmadeyBot, FTP Innovations, and Complex Domain Strategy
Amadey
2024-09-08WiredAndy Greenberg
A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities
2024-09-06SpyCloudJames
The Curious Case of an Open Source Stealer: Phemedrone
Phemedrone Stealer
2024-09-05Kaspersky LabsSherif Magdy
Tropic Trooper spies on government entities in the Middle East
2024-09-05IntegoJoshua Long
New macOS malware HZ RAT gives attackers backdoor access to Macs
HZ RAT
2024-09-04Group-IBSharmine Low
APT Lazarus: Eager Crypto Beavers, Video calls and Games
BeaverTail
2024-09-04Trend MicroCedric Pernet, Jaromír Hořejší
Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion
KTLVdoor KTLVdoor
2024-09-04cybleCyble
The Intricate Babylon RAT Campaign Targets Malaysian Politicians, Government
BabyLon RAT
2024-09-03Hunt.ioHunt.io
ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
TONESHELL
2024-09-03Twitter (@embee_research)Embee_research
Advanced Cyberchef Techniques - Defeating Nanocore Obfuscation With Math and Flow Control
Nanocore RAT
2024-08-30MicrosoftMicrosoft Threat Intelligence
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
FudModule
2024-08-30NetskopeLeandro Froes
Latrodectus Rapid Evolution Continues With Latest New Payload Features
Latrodectus
2024-08-29GoogleClement Lecigne, Josh Atkins, Luke Jenkins
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
ANDROSNATCH Unidentified APK 009 (Chrome Recon) COOKIESNATCH VALIDVICTOR
2024-08-29ProofpointPim Trouerbach, Selena Larson, Tommy Madjar
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Voldemort
2024-08-29NetskopeLeandro Froes
Latrodectus Rapid Evolution Continues With Latest New Payload Features
Latrodectus
2024-08-29SecuronixDen Iyzvyk, Tim Peck
From Cobalt Strike to Mimikatz: A Deep Dive into the SLOW#TEMPEST Campaign Targeting Chinese Users
Cobalt Strike MimiKatz