Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-07Perception PointArthur Vaiselbuh
Evasive ZIP Concatenation: Trojan Targets Windows Users
SmokeLoader
2024-11-07LogpointAnish Bogati
Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
Loki Password Stealer (PWS)
2024-11-07nimanthadeshappriya.comNimantha Deshappriya
SideWinder’s ( T-APT-04 ) Sri Lanka Adventure
2024-11-06SophosAsha Castle, Hikaru Koike, Sean Gallagher, Trang Tang
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
GootLoader
2024-11-06CloudsekCloudsek
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave
Mozi
2024-11-06YouTube ( Hexacon)Clement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-11-06Check Point ResearchCheck Point Research
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Rhadamanthys
2024-11-06Kaspersky LabsKirill Korchemny
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
2024-11-05Hunt.ioHunt.io
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit
Running RAT
2024-11-04Israel National Cyber Directorate (INCD)Israel National Cyber Directorate (INCD)
Deep Drive Analysis of the BeaverTail Infostealer
BeaverTail
2024-11-04Medium (@DCSO_CyTec)Denis Szadkowski, Johann Aydinbas, Maike Orlikowski, Paul van Ramesdonk
Unransomware: From Zero to Full Recovery in a Blink
Akira
2024-11-04CleafyAlessandro Strino, Federico Valentini, Michele Roviello
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM
ToxicPanda
2024-11-04SecuronixDen Iyzvyk, Tim Peck
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging
Chisel
2024-11-04ZscalerZscaler
From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in the West
BeaverTail InvisibleFerret WageMole
2024-11-01LevelBlueFernando Martinez
Ngioweb Remains Active 7 Years Later
Ngioweb
2024-11-01Googleandy2002a
Finding Malware: Detecting GOOTLOADER with Google Security Operations.
GootLoader
2024-10-31Twitter (@MonThreat)ThreatMon
Tweet about EvilByte claiming to have hacked MyFatoorah
Evilbyte
2024-10-31Hunt.ioHunt.io
Tricks, Treats, and Threats: Cobalt Strike & the Goblin Lurking in Plain Sight
Cobalt Strike
2024-10-31SpamhausSpamhaus Malware Labs
Toot about Darkgate / SSLoad targeting Ukraine
DarkGate SSLoad
2024-10-31Twitter (@nextronresearch)Nextron Systems
Tweet about discovery of HellDown ransomware
HellDown