Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-03-25VMWare Carbon BlackBaibhav Singh, Giovanni Vigna, Threat Analysis Unit
Memory Forensics for Virtualized Hosts
2021-03-25VMWare Carbon BlackBaibhav Singh, Giovanni Vigna, Threat Analysis Unit
Memory Forensics for Virtualized Hosts
2021-03-25VMWare Carbon BlackBaibhav Singh, Giovanni Vigna, Threat Analysis Unit
Memory Forensics for Virtualized Hosts
2021-03-18VinCSSm4n0w4r, Tran Trung Kien
[RE021] Qakbot analysis – Dangerous malware has been around for more than a decade
QakBot
2021-03-18VinCSSm4n0w4r, Tran Trung Kien
[RE021] Qakbot analysis – Dangerous malware has been around for more than a decade
QakBot
2021-03-18Github (lacework)lacework-labs
DGA and decoder scripts for n3cr0morph IRC malware
N3Cr0m0rPh
2021-03-16MorphisecNadav Lorber
Tracking HCrypt: An Active Crypter as a Service
AsyncRAT LimeRAT Remcos
2021-03-16ElasticJoe Desimone
Detecting Cobalt Strike with memory signatures
Cobalt Strike
2021-03-12360 netlabAlex.Turing, liuyang, YANG XU
New Threat: ZHtrap botnet implements honeypot to facilitate finding more victims
ZHtrap
2021-03-12360 netlabAlex.Turing, liuyang, YANG XU
New Threat: ZHtrap botnet implements honeypot to facilitate finding more victims
ZHtrap
2021-03-12360 netlabAlex.Turing, liuyang, YANG XU
New Threat: ZHtrap botnet implements honeypot to facilitate finding more victims
ZHtrap
2021-03-11IBMDave McMillen, Limor Kessem
Dridex Campaign Propelled by Cutwail Botnet and Poisonous PowerShell Scripts
Cutwail Dridex
2021-03-11CofenseElmer Hernandez
AutoHotKey Leveraged by Metamorfo/Mekotio Banking Trojan
Metamorfo
2021-03-09MorphisecAlon Groisman
MineBridge Is on the Rise, With a Sophisticated Delivery Mechanism
MINEBRIDGE
2021-03-02Atlantic CouncilJames Shires, JD Work, Luca Allodi, Patrick Howell O'Neill, Robert Morgus, Trey Herr, Winnona Desombre
Countering Cyber Proliferation: Zeroing in on Access-as-a-Service
2021-02-19The RecordAdam Janofsky, Timo Steffens
Cyber Attribution Is More Art Than Science. This Researcher Has a Plan to Change That
2021-02-19The RecordAdam Janofsky, Timo Steffens
Cyber Attribution Is More Art Than Science. This Researcher Has a Plan to Change That
2021-02-18of0x.ccof0x.cc
One thousand and one ways to copy your shellcode to memory (VBA Macros)
2021-02-17AquasecAssaf Morag
Threat Alert: TeamTNT Pwn Campaign Against Docker and K8s Environments
TeamTNT TeamTNT
2021-02-15Silent PushMartijn Grooten
More LodaRAT infrastructure targeting Bangladesh uncovered
Loda