Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-26ZscalerBrett Stone-Gross
CoffeeLoader: A Brew of Stealthy Techniques
CoffeeLoader
2025-03-26Twitter (@MalGamy12)Gameel Ali
Tweet about RALord ransomware
RALord
2025-03-25JPCERT/CCHayato Sasaki
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
2025-03-25DomainToolsDomainTools
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict
2025-03-25Kaspersky LabsBoris Larin, Igor Kuznetsov
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain
2025-03-25SpyCloudJames
On the Hunt for Ghost(Socks)
GhostSocks
2025-03-23AviaBAviaB
Analyzing Vidar Stealer
Vidar
2025-03-20ESET ResearchMatthieu Faou
Operation FishMedley
ShadowPad SodaMaster Spyder
2025-03-20Cisco TalosAsheer Malhotra, Brandon White, Jungsoo An, Vitor Ventura
UAT-5918 targets critical infrastructure entities in Taiwan
LaZagne JuicyPotato Meterpreter MimiKatz
2025-03-20Denwp ResearchTonmoy Jitu
Reversing FUD AMOS Stealer
AMOS
2025-03-18TrellixJambul Tologonov, John Fokker
Analysis of Black Basta Ransomware Chat Leaks
Black Basta Black Basta
2025-03-18ExpelAARON WALTON
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back)
Black Basta Black Basta
2025-03-18WeLiveSecurityDominik Breitenbacher
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
Anel AsyncRAT
2025-03-17CloudflareCloudflare
Black Basta’s blunder: exploiting the gang’s leaked chats
Black Basta Black Basta
2025-03-16cyb3rjerry
Analyzing the RedTiger Malware Stealer
RedTiger Stealer
2025-03-15Github (TheRavenFile)Rakesh Krishnan
IoCs for Anubis Backdoor
Anubis Backdoor
2025-03-14VitalDigitalForensicsv4ensics
Lumma Stealer – A tale that starts with a fake Captcha
Lumma Stealer
2025-03-14Trend MicroAdam O'Connor, Ian Kenefick, Jack Walsh, Laura Medina, Lucas Silva
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
FAKEUPDATES RansomHub
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-13SecuronixDen Iyzvyk, Tim Peck
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits
Quasar RAT r77