Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-23ANY.RUNANY.RUN, Mostafa ElSheimy
DarkComet RAT: Technical Analysis of Attack Chain
DarkComet
2024-10-23Kaspersky LabsBoris Larin
The Crypto Game of Lazarus APT: Investors vs. Zero-days
2024-10-23Cisco TalosEdmund Brumaghin, Holger Unterbrink, Jordyn Dunk, Nicole Hoffman
Highlighting TA866/Asylum Ambuscade Activity Since 2021
WasabiSeed Cobalt Strike csharp-streamer RAT Resident Rhadamanthys WarmCookie
2024-10-23Cisco TalosEdmund Brumaghin, Holger Unterbrink, Jordyn Dunk, Nicole Hoffman
Threat Spotlight: WarmCookie/BadSpace
Cobalt Strike csharp-streamer RAT WarmCookie
2024-10-23Trend MicroBren Matthew Ebriega, Buddy Tancio, Mohamed Fahmy
Unmasking Prometei: A Deep Dive Into Our MXDR Findings
Prometei
2024-10-22NCSC UKNCSC UK
Malware Analysis Report: Pigmy Goat
PigmyGoat
2024-10-22AirbusAdams Kone
Incident Response: Analysis of recent version of BRC4
Brute Ratel C4
2024-10-22Silent PushSilent Push
Triad Nexus: Silent Push exposes FUNNULL CDN hosting DGA domains for suspect Chinese gambling sites, investment scams, a retail phishing campaign, and a polyfill.io supply chain attack impacting 110,000+ sites
2024-10-22LogpointSwachchhanda Shrawan Poudel
Latrodectus: The Wrath of Black Widow
Latrodectus
2024-10-22Cisco TalosChetan Raghuprasad
Threat actor abuses Gophish to deliver new PowerRAT and DCRAT
PowerRAT
2024-10-22Twitter (@threatinsight)Threat Insight
Twitter Thread attributing Voldemort to TA415 (APT41, BrassTyphoon)
Voldemort
2024-10-22Kaspersky LabsGReAT
Grandoreiro, the global trojan with grandiose ambitions
Grandoreiro
2024-10-21Ministry of Justice and SecurityNational Coordinator for Counterterrorism and Security
Cyber Security Picture Netherlands 2024
2024-10-21SOCRadarSOCRadar
Biggest Education Industry Attacks in 2024
OverFlame
2024-10-21VMRayVMRay Labs Team
Latrodectus: A year in the making
Latrodectus
2024-10-20cocomelonccocomelonc
Malware and cryptography 33: encrypt payload via Lucifer algorithm. Simple C example.
2024-10-19Emanuele De Lucia on SecurityEmanuele De Lucia
“Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel
OctoberSeventh
2024-10-19ElasticSalim Bitam
Tricks and Treats: GHOSTPULSE’s new pixel- level deception
HijackLoader
2024-10-18ForcepointMayur Sewani
Inside the Latrodectus Malware Campaign Old School Phishing Meets Innovative Payload Delivery
Latrodectus
2024-10-18NetskopeLeandro Froes
New Bumblebee Loader Infection Chain Signals Possible Resurgence
BumbleBee