Click here to download all references as Bib-File.•
2023-06-06
⋅
Apophis133
⋅
RedLine Technical Analysis Report RedLine Stealer |
2023-04-28
⋅
Twitter (@MichalKoczwara)
⋅
Tweet on hunting BRC4 infrastructure Brute Ratel C4 |
2023-04-13
⋅
GOV.PL
⋅
HALFRIG - Malware Analysis Report HALFRIG |
2023-02-02
⋅
0x0d4y
⋅
[Zero2Automated] Complete Custom Sample Challenge Analysis CruLoader |
2023-01-04
⋅
CSO Online
⋅
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says BlueHornet |
2022-12-19
⋅
kienmanowar Blog
⋅
[Z2A]Bimonthly malware challege – Emotet (Back From the Dead) Emotet |
2022-09-26
⋅
Palo Alto Networks Unit 42
⋅
Hunting for Unsigned DLLs to Find APTs PlugX Raspberry Robin Roshtyak |
2022-08-11
⋅
Group-IB
⋅
Challenge accepted Detecting MaliBot, a fresh Android banking trojan, with a Fraud Protection solution |
2022-08-01
⋅
Qualys
⋅
Here’s a Simple Script to Detect the Stealthy Nation-State BPFDoor BPFDoor |
2022-07-20
⋅
Symantec
⋅
LockBit: Ransomware Puts Servers in the Crosshairs LockBit |
2022-07-18
⋅
Palo Alto Networks Unit 42
⋅
Shallow Taurus FormerFirstRAT IsSpace NewCT PlugX Poison Ivy Tidepool DragonOK |
2022-07-14
⋅
Sophos
⋅
BlackCat ransomware attacks not merely a byproduct of bad luck BlackCat BlackCat |
2022-06-28
⋅
Symantec
⋅
Bumblebee: New Loader Rapidly Assuming Central Position in Cyber-crime Ecosystem BumbleBee |
2022-06-13
⋅
Avast Decoded
⋅
Linux Threat Hunting: ‘Syslogk’ a kernel rootkit found under development in the wild Rekoobe |
2022-06-07
⋅
Lacework Labs
⋅
Kinsing & Dark.IoT botnet among threats targeting CVE-2022-26134 Dark Kinsing |
2022-05-31
⋅
Thales
⋅
Cyber Threat Handbook 2002 GOBLIN PANDA Thrip |
2022-05-12
⋅
Lacework Labs
⋅
Malware targeting latest F5 vulnerability Mirai |
2022-05-12
⋅
Palo Alto Networks Unit 42
⋅
Harmful Help: Analyzing a Malicious Compiled HTML Help File Delivering Agent Tesla Agent Tesla |
2022-05-11
⋅
ExaTrack
⋅
Tricephalic Hellkeeper: a tale of a passive backdoor BPFDoor Bvp47 Uroburos |
2022-05-06
⋅
CrowdStrike
⋅
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis Lador |