Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-16cyb3rjerry
Analyzing the RedTiger Malware Stealer
RedTiger Stealer
2025-03-15DeXposeM4lcode
Understanding SalatStealer: Features and Impact
SalatStealer
2025-03-15Github (TheRavenFile)Rakesh Krishnan
IoCs for Anubis Backdoor
Anubis Backdoor
2025-03-14VitalDigitalForensicsv4ensics
Lumma Stealer – A tale that starts with a fake Captcha
Lumma Stealer
2025-03-14Trend MicroAdam O'Connor, Ian Kenefick, Jack Walsh, Laura Medina, Lucas Silva
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
FAKEUPDATES RansomHub
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-13APNICAcey9, Alex.Turing, Daji, Wang Hao
Botnets never die
AIRASHI Aisuru kitty-socks5
2025-03-13SecuronixDen Iyzvyk, Tim Peck
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits
Quasar RAT r77
2025-03-13EclecticIQArda Büyükkaya
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
Black Basta
2025-03-13ForescoutForescout Research, Sai Molige
New Ransomware Operator Exploits Fortinet Vulnerability Duo
BlackMatter LockBit Mora_001
2025-03-13Cyfirmacyfirma
Tracking Ransomware: February 2025
LinkC Pub
2025-03-13InfobloxJason Hill
Work Hard, Pay Harder!
2025-03-13Tinyhack.comtinyhack
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs
Akira
2025-03-13Group-IBGroup-IB
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims
Emmenhtal Lumma Stealer
2025-03-13Linkedin (ThreatMon)Aziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Chrome DLL Manipulation Attack Exposed
2025-03-13Medium walmartglobaltechJason Reaves
ArechClient; Decoding IOCs and finding the onboard browser extension
SectopRAT
2025-03-12cocomelonccocomelonc
Malware development: persistence - part 27. Scheduled Tasks. Simple C example.
2025-03-12Medium walmartglobaltechJason Reaves
Golang backdoor with a side of ChromeUpdateAlert App
2025-03-12Youtube (AhmedS Kasmani)AhmedS Kasmani
Initial Analysis of Black Basta Chat Leaks
Black Basta Black Basta
2025-03-12YouTube (John Hammond)John Hammond
LEAKED Russian Hackers Internal Chats
Black Basta Black Basta