Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-13SekoiaColine Chavane, Sekoia TDR
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats
2024-11-13TEHTRISTEHTRIS
Cracking Formbook malware: Blind deobfuscation and quick response techniques
Formbook
2024-11-12SecurityScorecardRyan Sherstobitoff
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
2024-11-12Hunt.ioHunt.io
Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Sliver
2024-11-12DataBreaches.netDissent
Amazon confirms employee data breach after vendor hack
Nam3L3ss
2024-11-08Trend MicroLenart Bermejo, Leon M Chang, Ted Lee
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
2024-11-08Rostelecom-SolarSolar 4RAYS
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures
2024-11-07ESET ResearchESET Research
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey
FrostyNeighbor
2024-11-07Perception PointArthur Vaiselbuh
Evasive ZIP Concatenation: Trojan Targets Windows Users
SmokeLoader
2024-11-07LogpointAnish Bogati
Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
Loki Password Stealer (PWS)
2024-11-06SophosAsha Castle, Hikaru Koike, Sean Gallagher, Trang Tang
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
GootLoader
2024-11-06CloudsekCloudsek
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave
Mozi
2024-11-06YouTube ( Hexacon)Clement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-11-06Kaspersky LabsKirill Korchemny
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
2024-11-05Hunt.ioHunt.io
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit
Running RAT
2024-11-04CleafyAlessandro Strino, Federico Valentini, Michele Roviello
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM
ToxicPanda
2024-11-04SecuronixDen Iyzvyk, Tim Peck
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging
Chisel
2024-11-01Googleandy2002a
Finding Malware: Detecting GOOTLOADER with Google Security Operations.
GootLoader
2024-10-31Twitter (@MonThreat)ThreatMon
Tweet about EvilByte claiming to have hacked MyFatoorah
Evilbyte
2024-10-31Hunt.ioHunt.io
Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight
Cobalt Strike