Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-06-29MorphisecArnold Osipov
GuLoader Campaign Targets Law Firms in the US
CloudEyE
2023-06-29Luca D'Amico
Disk Knight Worm Analysis
Disk Knight
2023-06-29BusinessWireDaria Zhukova
Dark Web Intelligence Shows Everest Ransomware Group Increasing Initial Access Broker Activity
2023-06-29MalwareBookReportsmuzi
GuLoader: Navigating a Maze of Intricacy
CloudEyE
2023-06-29SentinelOneAlex Delamotte, Jim Walter
Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army
Rhysida
2023-06-29Sekoiasekoia
Following NoName057(16) DDoSia Project’s Targets
Dosia
2023-06-29ElasticAndrew Pease, Colson Wilhoit, Ricardo Ungureanu, Salim Bitam, Seth Goodwin
The DPRK strikes using a new variant of RUSTBUCKET
RustBucket
2023-06-29Avast DecodedThreat Research Team
Decrypted: Akira Ransomware
Akira
2023-06-29DeepInstinctDeep Instinct Threat Lab, Simon Kenin
PhonyC2: Revealing a New Malicious Command & Control Framework by MuddyWater
PhonyC2 POWERSTATS
2023-06-28BI. ZONE Cyber Threats Research TeamOleg Skulkin
Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms
RedCurl
2023-06-28vmwareBria Beathley, Dana Behling, Deborah Snyder, Fae Carlisle
8Base Ransomware: A Heavy Hitting Player
8Base Phobos SmokeLoader SystemBC
2023-06-28MandiantAlexander Marvi, Greg Blaum, Ron Craft
Detection, Containment, and Hardening Opportunities for Privileged Guest Operations, Anomalous Behavior, and VMCI Backdoors on Compromised VMware Hosts
UNC3886
2023-06-28AhnLabSanseo
Kimsuky Attack Group Abusing Chrome Remote Desktop
Appleseed
2023-06-28Kaspersky LabsGReAT
Andariel’s silly mistakes and a new malware family
Jupiter
2023-06-28SpecterOpsCraig Wright
Sowing Chaos and Reaping Rewards in Confluence and Jira
2023-06-28VolexityAnkur Saini, Charlie Gardner
Charming Kitten Updates POWERSTAR with an InterPlanetary Twist
POWERSTAR
2023-06-28RussianPanda
Meduza Stealer or The Return of The Infamous Aurora Stealer
Meduza Stealer
2023-06-27ViuleeenzAlessandro Strino
IDA-Python - Locate a function independently from its offset
2023-06-27ZeroFoxZeroFox Dark Ops intelligence team
The Underground Economist: Volume 3, Issue 12
DarkGate Meduza Stealer
2023-06-27SecurityIntelligenceCharlotte Hammond, Ole Villadsen
The Trickbot/Conti Crypters: Where Are They Now?
Black Basta Conti Mount Locker PhotoLoader Royal Ransom SystemBC TrickBot