Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-09-13AdvIntelAdvanced Intelligence
AdvIntel's State of Emotet aka "SpmTools" Displays Over Million Compromised Machines Through 2022
Conti Cobalt Strike Emotet Ryuk TrickBot
2022-09-13Palo Alto Networks Unit 42Jeff White
OriginLogger: A Look at Agent Tesla’s Successor
Agent Tesla OriginLogger
2022-09-13Sansec Threat ResearchSansec Threat Research Team
Magento vendor Fishpig hacked, backdoors added
Rekoobe
2022-09-12Infosec WriteupsAaron Stratton
Raccoon Stealer v2 Malware Analysis
Raccoon RecordBreaker
2022-09-12Trend MicroNitesh Surana
Security Breaks: TeamTNT’s DockerHub Credentials Leak
2022-09-12VMRayPascal Brackmann
The evolution of GuLoader
CloudEyE
2022-09-12Arctic WolfAlex Ammons, Arctic Wolf Labs Team, Markus Neis, Ross Phillips, Steven Campbell, Teresa Whitmore
Chiseling In: Lorenz Ransomware Group Cracks MiVoice And Calls Back For Free
Chisel Lorenz
2022-09-12d01aMohamed Adel
Raccoon Stealer V2 in depth Analysis
Raccoon RecordBreaker
2022-09-12The DFIR ReportThe DFIR Report
Dead or Alive? An Emotet Story
Cobalt Strike Emotet
2022-09-11Github (0xTriboulet)Steve S
Github Repository for Revenant
Revenant
2022-09-11Github (HavocFramework)C5pider
Havoc
Havoc
2022-09-10cocomelonc
Malware development: persistence - part 10. Using Image File Execution Options. Simple C++ example.
SUNBURST
2022-09-10Malversegreenplan
Realizziamo un C&C Server in Python (Bankshot)
Bankshot
2022-09-09Github (m4now4r)m4n0w4r
“Mustang Panda” – Enemy at the gate
PlugX
2022-09-09ElasticSalim Bitam
BUGHATCH Malware Analysis
BUGHATCH
2022-09-09CofenseAndy Mann, Dylan Main
Lampion Trojan Utilizes New Delivery through Cloud-Based Sharing
lampion
2022-09-08Cisco TalosAsheer Malhotra, Jung soo An, Vitor Ventura
Lazarus and the tale of three RATs
MagicRAT MimiKatz VSingle YamaBot
2022-09-08Trend MicroAlfredo Oliveira, David Fiser, Nitesh Surana
How Malicious Actors Abuse Native Linux Tools in Attacks
2022-09-08MandiantAlden Wahlstrom, Alice Revelli, Cameron Sabel, Jon Ford, Kelli Vanderlee, Luke McNamara, Sam Riddell
What to Expect When You’re Electing: Preparing for Cyber Threats to the 2022 U.S. Midterm Elections
2022-09-08MicrosoftMicrosoft Security Threat Intelligence
Microsoft investigates Iranian attacks against the Albanian government
ZeroCleare