Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-12QianxinQianxin Threat Intelligence Center
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets
MiyaRAT
2024-10-11Nextron SystemsNextron Threat Research Team
In-Depth Analysis of Lynx Ransomware
Lynx
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East
STEALHOOK OilRig
2024-10-11zimperiumAazim Yaswant
Expanding the Investigation: Deep Dive into Latest TrickMo Samples
TrickMo
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
STEALHOOK
2024-10-10NCSC SwitzerlandNCSC Switzerland
Brief technical analysis of the "Gorilla" botnet
Gorilla Gorilla
2024-10-10ZscalerMuhammed Irfan V A
Technical Analysis of DarkVision RAT
DarkVision RAT
2024-10-10Security BoulevardJeffrey Burt
Internet Archive is Attacked and 31 Million Files Stolen
Blackmeta
2024-10-10SOCRadarSOCRadar
Internet Archive Data Breach and DDoS Attacks: What You Need to Know
Blackmeta
2024-10-10DomainToolsSteve Behm
Uncovering Domains Created by Octo2’s Domain Generation Algorithm
Coper
2024-10-10Hunt.ioHunt.io
Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
PlugX
2024-10-09Recorded FutureInsikt Group
Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware
Broomstick Rhysida
2024-10-09Palo AltoUnit 42
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
beavertail Beavertail
2024-10-08TrustwaveCris Tomboc, King Orande
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader
Pronsis Loader Latrodectus Lumma Stealer
2024-10-08Hunt.ioHunt.io
Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Pages
SpyNote
2024-10-07Kaspersky LabsKaspersky
Awaken Likho is awake: new techniques of an APT group
Awaken Likho
2024-10-06GoogleClement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-10-05Mandar Naik
Malware Analysis - Lumma Stealer
Lumma Stealer
2024-10-04VirusBulletinThibault Seret
Octopus Prime: it didn't turn into a truck, but a widely spread Android botnet
Coper
2024-10-04nikhilh-20Nikhil Hegde
Emansrepo Infostealer - PyInstaller, Deobfuscation and LLM
emansrepo