Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-09Medium walmartglobaltechJason Reaves, Joshua Platt
Pivoting on a SharpExt to profile Kimusky panels for great good
Kimsuky
2022-08-09Twitter (@Katechondic)Katechondic
Tweet on malware, suspected to be from China based actor, targeting Taiwan
PUBLOAD
2022-08-09CiscoOnur Mustafa Erdogan
Raspberry Robin: Highly Evasive Worm Spreads over External Disks
Raspberry Robin
2022-08-09SUCURILuke Leal
Fake Instagram Verification & Twitter Badge Phishing
2022-08-09cybleCyble Research Labs
Bitter APT Group Using “Dracarys” Android Spyware
Dracarys
2022-08-09KasperskyKurt Baumgartner, Seongsu Park
Andariel deploys DTrack and Maui ransomware
Dtrack Maui Ransomware
2022-08-09ZscalerJagadeeswar Ramanukolanu, Sudeep Singh
AiTM phishing attack targeting enterprise users of Gmail
2022-08-08BrandefenseBrandefense
Dynamite Panda APT Group
Roseam
2022-08-08FortinetJames Slaughter
Life After Death - SmokeLoader Continues to Haunt Using Old Vulnerabilities
SmokeLoader zgRAT
2022-08-08SOCRadarSOCRadar
Linux Malware RapperBot Brute Forcing SSH Servers
RapperBot
2022-08-08AhnLabASEC Analysis Team
Monero CoinMiner Being Distributed via Webhards
Monero Miner
2022-08-08Medium CSIS TechblogBenoît Ancel
An inside view of domain anonymization as-a-service — the BraZZZerSFF infrastructure
Riltok magecart Anubis Azorult BetaBot Buer CoalaBot CryptBot DiamondFox DreamBot GCleaner ISFB Loki Password Stealer (PWS) MedusaLocker MeguminTrojan Nemty PsiX RedLine Stealer SmokeLoader STOP TinyNuke Vidar Zloader
2022-08-08AccidentalRebelKarlo Licudine
Malware sandbox evasion in x64 assembly by checking ram size - Part 1
2022-08-08KasperskyKaspersky Lab ICS CERT
Targeted attack on industrial enterprises and public institutions
Cotx RAT Logtu nccTrojan PortDoor
2022-08-08The DFIR ReportThe DFIR Report
BumbleBee Roasts Its Way to Domain Admin
BumbleBee Cobalt Strike
2022-08-08N1ght-W0lf BlogAbdallah Elshinbary
YARA for config extraction
RedLine Stealer
2022-08-07Malversegreenplan
Config Extractor per DanaBot (PARTE 1)
DanaBot
2022-08-07ResecurityResecurity
LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities
2022-08-07ResecurityResecurity
Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples
2022-08-07forensicitguyTony Lambert
Analyzing .NET Core Single File Samples (DUCKTAIL Case Study)
DUCKTAIL