Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-01-08ThreatMonAlp Cihangir Aslan, Aziz Kaplan, Ozan Ünal, ThreatMon, ThreatMon Malware Research Team
Akira Ransomware Group & Malware Analysis Report
Akira
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2025-01-07SOCRadarAmeer Onwa
Turla Cyber Campaign Targeting Pakistan’s Critical Infrastructure
2025-01-07Recorded FutureInsikt Group
Unveiling Russian Surveillance Tech Expansion in Central Asia and Latin America
2025-01-07Hunt.ioHunt.io
Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Cobalt Strike
2025-01-07SANS ISCYee Ching Tok
PacketCrypt Classic Cryptocurrency Miner on PHP Servers
2025-01-06North Korean InternetNick
Hangro: Investigating North Korean VPN Infrastructure Part 1
2025-01-06KasperskySaurabh Sharma, Vasily Berdnikov
EAGERBEE, with updated and novel components, targets the Middle East
EagerBee CoughingDown
2025-01-04revdiaries.comheapoverflow
"Solara" Roblox Executor Malware
Rhadamanthys
2025-01-03Nimantha Deshappriya
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape)
AsyncRAT Quasar RAT Remcos
2025-01-03SANS ISCXavier Mertens
SwaetRAT Delivery Through Python
SwaetRAT
2025-01-02Cyfirmacyfirma
NonEuclid RAT
NonEuclid RAT
2024-12-31MaveritsMaverits
APT28 the long hand of Russian interests
MooBot STEELHOOK MASEPIE HATVIBE CredoMap Headlace OCEANMAP
2024-12-31SOCRadarSOCRadar
Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc.
2024-12-30FortinetChris Hall
Catching "EC2 Grouper"- no indicators required!
EC2 Grouper
2024-12-30IntrinsecCTI Intrinsec
CryptBot: Hunting for initial access vectors
CryptBot Lumma Stealer PrivateLoader
2024-12-30Medium TRAC LabsTRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander
Satacom
2024-12-29cocomelonccocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
2024-12-28Medium s.lontzetidisEfstratios Lontzetidis
Lumma 2024: Dominating the Info-Stealer Market
Lumma Stealer
2024-12-26Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software
ComeBacker