Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-10The Hacker NewsRavie Lakshmanan
More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack
More_eggs
2024-06-07SOCRadarSOCRadar
Grandoreiro Malware Campaign: A Global Threat to Banking Security
Grandoreiro
2024-06-06Hunt.ioHunt.io
Tracking LightSpy: Certificates as Windows into Adversary Behavior
lightSpy
2024-06-06CrowdStrikeAlexandru Dinu, Dragoș Corlătescu, Mihaela Găman, Paul Sumedrea
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
2024-06-06kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] DarkGate – Make AutoIt Great Again
DarkGate
2024-06-05SymantecSymantec Threat Intelligence
RansomHub: New Ransomware has Origins in Older Knight
Knight RansomHub RansomHub
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-05QurakslabFabrice Rossi, Florian Yger, Riccardo Mori, Robin David, Roxane Cohen
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Slides)
2024-06-05QuarksLabFabrice Rossi, Florian Yger, Riccardo Mori, Robin David, Roxane Cohen
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Video)
2024-06-05Cert-UACert-UA
UAC-0020 (Vermin) attacks the Defense Forces of Ukraine using the SPECTR SPZ in tandem with the legitimate SyncThing ("SickSync" campaign) (CERT-UA#9934)
UAC-0020
2024-06-05SekoiaCharles Meslay
Reverse engineering of malicious code in CTI - Analysis of the evolution of an infection chain (Paper)
FlowCloud
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-06-05Cisco TalosCisco Talos
DarkGate switches up its tactics with new payload, email templates
DarkGate
2024-06-04AquasecNitzan Yaakov
Muhstik Malware Targets Message Queuing Services Applications
Tsunami
2024-06-04Cert-UACert-UA
UAC-0200: Targeted cyberattacks using DarkCrystal RAT and Signal as a trusted distribution vehicle (CERT-UA#9918)
DCRat
2024-06-03SpyCloudJames
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft
AMOS
2024-06-03SekoiaPierre Le Bourhis, Quentin Bourgue, Sekoia TDR
PikaBot: a Guide to its Deep Secrets and Operations
Pikabot
2024-05-30Cisco TalosAsheer Malhotra
LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
purpleink LilacSquid
2024-05-30LumenBlack Lotus Labs
The Pumpkin Eclipse
Chalubo
2024-05-30Trend MicroSunil Bharti
Decoding Water Sigbin's Latest Obfuscation Tricks
Water Sigbin