Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-04ProofpointAbdallah Elshinbary, Jonas Wagner, Konstantin Klinger, Nick Attfield
The Bitter End: Unraveling Eight Years of Espionage Antics—Part One
Artra Downloader Havoc
2025-06-03cocomelonccocomelonc
Linux hacking part 5: building a Linux keylogger. Simple C example
2025-06-03ThreatFabricThreatFabric
Crocodilus Mobile Malware: Evolving Fast, Going Global
Crocodilus
2025-06-03VMRayAlbert Zsigovits, VMRay
Rhadamanthys slips through in large installer files
Rhadamanthys
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-06-03ANY.RUNANY.RUN
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals
BeaverTail OtterCookie InvisibleFerret
2025-06-02Aryaka Networksbikash dash, varadharajan krishnasamy
Remcos on the Wire: Analyzing Network Artifacts and C2 Command Structures
Remcos
2025-06-02haxrob.nethaxrob
BPFDoor Part 2 - The Present
BPFDoor
2025-06-02haxrob.nethaxrob
BPFDoor - Part 1 - The past
BPFDoor
2025-05-31Medium (@mvaks)mvaks
Crocodilus in the wild: Mapping the campaign in Poland
Crocodilus
2025-05-31The InsiderChristo Grozev, Michael Weiss, Roman Dobrokhotov
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad
2025-05-30CensysHimaja Motheram
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
2025-05-30IntrinsecDavid Sardinha
BtHoster: Identifying noisy networks emitting malicious traffic through masscan servers
2025-05-29cocomelonccocomelonc
Malware and cryptography 42 - encrypt/decrypt payload via Speck cipher. Simple C example.
2025-05-29FortinetJohn Simmons, Xiaopeng Zhang
Deep Dive into a Dumped Malware without a PE Header
2025-05-29ElasticJia Yu Chan
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns
EDDIESTEALER
2025-05-28Medium (@mvaks)mvaks
Bombardino Crocodilo in Poland — analysis of IKO Lokaty mobile malware campaign
Crocodilus
2025-05-28Rapid7Anna Širokova, Ivan Feigl
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign
Winos
2025-05-28EclecticIQAlon Gal, Arda Büyükkaya
Pakistan Telecommunication Company (PTCL) Targeted by Bitter APT During Heightened Regional Conflict
WmRAT
2025-05-28DarktraceTara Gould
PumaBot: Novel Botnet Targeting IoT Surveillance Devices
PumaBot