Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-22Check PointAlexey Bukhteyev, Arie Olshtein
Cloud-based Malware Delivery: The Evolution of GuLoader
CloudEyE
2023-05-22Trend MicroBahaa Yamany, Mahmoud Zohdy, Mohamed Fahmy, Sherif Magdy
BlackCat Ransomware Deploys New Signed Kernel Driver
BlackCat
2023-05-22Cluster25Cluster25 Threat Intel Team
Back in Black: BlackByte Ransomware returns with its New Technology (NT) version
BlackByte
2023-05-21Github (0xThiebaut)Maxime Thiebaut
PCAPeek
IcedID QakBot
2023-05-20DataBreaches.netDissent
Peachtree Orthopedics alerts patients to cyberattack; third patient data breach in seven years
TheDarkOverlord
2023-05-20@0xToxin
Kraken - The Deep Sea Lurker Part 1
KrakenKeylogger
2023-05-19YouTube (NorthSec)Ivan Kwiatkowski
Go reverse-engineering workshop
GoldMax
2023-05-19Kaspersky LabsGeorgy Kucherin, Igor Kuznetsov, Leonid Bezvershenko
CloudWizard APT: the bad magic story goes on
PowerMagic CloudWizard CommonMagic Prikormka
2023-05-19Trend MicroJaromír Hořejší, Nitesh Surana
Rust-Based Info Stealers Abuse GitHub Codespaces
DeltaStealer
2023-05-19cocomelonccocomelonc
Malware source code investigation: AsyncRAT
AsyncRAT
2023-05-19Twitter (@embee_research)Embee_research
Analysis of Amadey Bot Infrastructure Using Shodan
Amadey
2023-05-18zimperiumNicolás Chiaraviglio
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy
OilAlpha
2023-05-18AhnLabASEC
SparkRAT Being Distributed Within a Korean VPN Installer
SparkRAT
2023-05-18Twitter (@embee_research)Embee_research
Identifying Laplas Infrastructure Using Shodan and Censys
LaplasClipper
2023-05-18IntezerRyan Robinson
How Hackers Use Binary Padding to Outsmart Sandboxes and Infiltrate Your Systems
Emotet
2023-05-18Nikhil Hegde
Looking Closer at BPF Bytecode in BPFDoor
BPFDoor
2023-05-17SPURRiley Kilmer
Identifying the Nexus of Scaled Ad Fraud
2023-05-17S2W LAB Inc.BLKSMTH
Detailed Analysis of AlphaSeed, a new version of Kimsuky’s AppleSeed written in Golang
AlphaSeed
2023-05-17ANY.RUNANY.RUN
Deobfuscating the Latest GuLoader: Automating Analysis with Ghidra Scripting
CloudEyE
2023-05-17SekoiaFélix Aime
APT28 leverages multiple phishing techniques to target Ukrainian civil society