Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Chaos Unleashed: a Technical Analysis of a Novel Ransomware
Chaos
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Python's Dark Side When Crafting a Wallet Stealer Becomes Disturbingly Effortless
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Stealing in Stealth: Investigating a Python-based Evasive Malware Exela
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack
Kimsuky
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain
Konni
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Serpent Stealer Unmasked: Threat Analysis and Countermeasures
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT
AllaKore
2022-12-29ThreatMonThreatMon Malware Research Team
Mars Stealer Analysis
Mars Stealer
2022-12-22SekoiaPierre Le Bourhis, Quentin Bourgue, Threat & Detection Research Team
New RisePro Stealer distributed by the prominent PrivateLoader
RisePro
2022-12-21MicrosoftMicrosoft Security Threat Intelligence
Microsoft research uncovers new Zerobot capabilities
ZeroBot SparkRAT
2022-12-21Team CymruS2 Research Team
Inside the IcedID BackConnect Protocol
IcedID
2022-12-16SekoiaJamila B., Threat & Detection Research Team
The DPRK delicate sound of cyber
AppleJeus AppleJeus SnatchCrypto
2022-12-15Check Point ResearchCheck Point Research
Mobile #AlienBot malware starts utilizing an incorporated DGA module
Alien
2022-12-14ESET ResearchDominik Breitenbacher
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
LODEINFO MirrorFace
2022-12-13Margin ResearchJustin Sherman
Analyzing Russian SDK Pushwoosh and Russian Code Contributions
2022-12-12ReutersJosh Smith
North Korean cyber spies deploy new tactic: tricking foreign experts into writing research for them
2022-12-09SecureworksSecureWorks' Counter Threat Unit Research Team
Drokbk Malware Uses GitHub as Dead Drop Resolver
Drokbk
2022-12-08Team CymruS2 Research Team
Iranian Exploitation Activities Continue as of November 2022
2022-12-07ESET ResearchAdam Burgher
Fantasy – a new Agrius wiper deployed through a supply‑chain attack
Apostle DEADWOOD
2022-12-06BlackberryBlackBerry Research & Intelligence Team
Mustang Panda Uses the Russian-Ukrainian War to Attack Europe and Asia Pacific Targets
PlugX