Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-30ANY.RUNANY.RUN
Raccoon Stealer 2.0 Malware analysis
Raccoon RecordBreaker
2022-08-30Medium the_abjuri5tJohn F
NanoCore RAT Hunting Guide
Nanocore RAT
2022-08-29SekoiaLivia Tibirna, Quentin Bourgue, Threat & Detection Research Team
Traffers: a deep dive into the information stealer ecosystem
MetaStealer PrivateLoader Raccoon RedLine Stealer Vidar
2022-08-29SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: New Golang Attack Campaign GO#WEBBFUSCATOR Leverages Office Macros and James Webb Images to Infect Systems
2022-08-29360 netlabwanghao
PureCrypter is busy pumping out various malicious malware families
Agent Tesla PureCrypter RedLine Stealer
2022-08-29Cyfirmacyfirma
CosmicDuke Malware Analysis Report
CosmicDuke
2022-08-29Palo Alto Networks Unit 42Janos Szurdi
Tor 101: How Tor Works and its Risks to the Enterprise
2022-08-29NetskopeGustavo Palazolo
AsyncRAT: Using Fully Undetected Downloader
AsyncRAT
2022-08-29cybleCyble
Mini Stealer: Possible Predecessor Of Parrot Stealer
MiniStealer
2022-08-29360 netlabwanghao
PureCrypter Loader continues to be active and has spread to more than 10 other families
404 Keylogger Agent Tesla AsyncRAT Formbook RedLine Stealer
2022-08-29Soc InvestigationBalaGanesh
Remcos RAT New TTPS - Detection & Response
Remcos
2022-08-29CYBER GEEKS All Things InfosecCyberMasterV
A Technical Analysis of Pegasus for Android – Part 1
Chrysaor
2022-08-29McAfeeOliver Devane, Vallabh Chole
Malicious Cookie Stuffing Chrome Extensions with 1.4 Million Users
2022-08-29AT&TFernando Martinez
Crypto miners’ latest techniques
2022-08-29InQuestDavid Ledbetter
Office Files, RTF files, Shellcode and more shenanigans
CloudEyE
2022-08-29Check PointMoshe Marelus
Check Point Research detects Crypto Miner malware disguised as Google translate desktop and other legitimate applications
Nitrokod
2022-08-28Lighthouse ReportsLighthouse Reports
Revealing Europe's NSO
Hermit
2022-08-28BleepingComputerIonut Ilascu
LockBit ransomware gang gets aggressive with triple-extortion tactic
LockBit
2022-08-26cocomelonc
Malware development: persistence - part 9. Default file extension hijacking. Simple C++ example.
Kimsuky
2022-08-25DataBreaches.netDissent
Major Indonesia tollroad operator hacked by DESORDEN (Updated)
Desorden Group