Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-10ZscalerSudeep Singh, Yin Hong Chang
DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1
Cobalt Strike DUSTPAN DUSTTRAP
2024-07-10AkamaiAllen West, Kyle Lefton, Sam Tinklenberg
CVE-2024-4577 Exploits in the Wild One Day After Disclosure
Tsunami Ghost RAT xmrig
2024-07-10Risky.bizCatalin Cimpanu
Risky Biz News: US takes down RT's Twitter bot farm
Lifting Zmiy
2024-07-09Twitter (@H4ckManac)HackManac
Tweet on data breaches caused by 888 group
Threat Actor 888
2024-07-09SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update January to June 2024
Coper FluBot Hook Bashlite Mirai FAKEUPDATES AsyncRAT BianLian Cobalt Strike DCRat Havoc NjRAT QakBot Quasar RAT RedLine Stealer Remcos Rhadamanthys RisePro Sliver
2024-07-09TG SoftGianfranco Tonello, Michele Zuin
Italian government agencies and companies in the target of a Chinese APT
9002 RAT
2024-07-08Kaspersky LabsGReAT
CloudSorcerer – A new APT targeting Russian government entities
CloudSorcerer
2024-07-08Solar 4RAYSSolar 4RAYS
Lifting Zmiy: hacking SCADA controllers in pursuit of prime victims
Lifting Zmiy
2024-07-06unknown
xeno-RAT open-source remote access tool (RAT)
XenoRAT
2024-07-06abuse.chabuse.ch
PovertyStealer malware samples
Lumar
2024-07-05CloudwaysAbdul Rehman
Hacker Allegedly Leaks Data from Shopify Breach on BreachForums
Threat Actor 888
2024-07-05KrollRyan Hicks
CLEARFAKE Update Tricks Victim into Executing Malicious PowerShell Code
ClearFake
2024-07-02K7 SecurityArunkumar
Kematian Stealer forked from PowerShell Token Grabber
Kematian Stealer
2024-07-02SekoiaQuentin Bourgue
Exposing FakeBat loader: distribution methods and adversary infrastructure
BlackCat Royal Ransom EugenLoader Carbanak Cobalt Strike DICELOADER Gozi IcedID Lumma Stealer NetSupportManager RAT Pikabot RedLine Stealer SectopRAT Sliver SmokeLoader Vidar
2024-07-02Malsada TechAaron Samala, April Bucaneg, Casey Kuwada
The LandUpdate808 Fake Update Variant
FAKEUPDATES
2024-07-01Speakerdeck (takahiro_haruyama)Takahiro Haruyama
The Art of Malware C2 Scanning - How to Reverse and Emulate Protocol Obfuscated by Compiler
DOPLUGS Hodur
2024-06-30ZW01fMohamed Ezat
Deep Analysis of Snake (404 keylogger)
404 Keylogger
2024-06-28Trend MicroAhmed Mohamed Ibrahim, Shubham Singh, Sunil Bharti
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer
Water Sigbin
2024-06-28cocomelonccocomelonc
Malware development trick 42: Stealing data via legit Discord Bot API. Simple C example.
2024-06-27QuoIntelligenceAndrei Moldovan
Analyzing the Shift in Ransomware Dynamics: The Impact of Law Enforcement and Future Outlooks
APT73