Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-29ProofpointPim Trouerbach, Selena Larson, Tommy Madjar
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Voldemort
2024-08-22MandiantAaron Lee, Praveeth DSouza
PEAKLIGHT: Decoding the Stealthy Memory-Only Malware
Emmenhtal
2024-08-19AquasecAssaf Morag
PG_MEM: A Malware Hidden in the Postgres Processes
XMRIG
2024-08-14AquasecAssaf Morag
Gafgyt Malware Variant Exploits GPU Power and Cloud Native Environments
Bashlite
2024-06-10The Hacker NewsRavie Lakshmanan
More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack
More_eggs
2024-06-05QurakslabFabrice Rossi, Florian Yger, Riccardo Mori, Robin David, Roxane Cohen
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Slides)
2024-06-05QuarksLabFabrice Rossi, Florian Yger, Riccardo Mori, Robin David, Roxane Cohen
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Video)
2024-05-22Kaspersky LabsGReAT
Stealers, stealers and more stealers
2024-04-24NCSC UKNCSC UK
Line Dancer - In-memory shellcode loader targeting Cisco Adaptive Security Appliance (ASA) devices.
2024-04-15Positive TechnologiesAleksandr Badaev, Kseniya Naumova
SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world
LokiBot 404 Keylogger Agent Tesla CloudEyE Formbook Remcos XWorm
2024-02-05ReutersMichael Perry, Neil Jerome Morales
Philippines wards off cyber attacks from China-based hackers
2024-01-18M4lcode, Mostafa Farghaly
Detect Mortis Locker Ransomware with YARA
Mortis
2024-01-18MorphisecArnold Osipov
Chae$ Chronicles: Version 4.1 Dedicated to Morphisec Researchers
Chaes
2024-01-18MorphisecArnold Osipov
Chae$ Chronicles: Version 4.1 Dedicated to Morphisec Researchers
Chaes
2024-01-10VolexityMatthew Meltzer, Robert Jan Mora, Sean Koessel, Steven Adair, Thomas Lancaster
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
UTA0178
2023-12-21Martin Clauß, Valentin Obst
BPF Memory Forensics with Volatility 3
BPFDoor TripleCross
2023-11-01Twitter (@embee_research)Embee_research
Malware Unpacking With Memory Dumps - Intermediate Methods (Pe-Sieve, Process Hacker, Hxd and Pe-bear)
AsyncRAT
2023-10-18GoogleKate Morgan
Government-backed actors exploiting WinRAR vulnerability
APT40
2023-10-03Luca Mella
Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)
LockBit LockBit Conti LockBit
2023-10-01r-tecSven Rath
.NET Assembly Obfuscation for Memory Scanner Evasion