Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-03-18Perception PointAriel Davidpur, Peleg Cabra
Operation PhantomBlu: New and Evasive Method Delivers NetSupport RAT
NetSupportManager RAT
2024-03-18PCriskTomas Meskauskas
FORCE (.FORCE) ransomware virus – removal and decryption options
Phobos
2024-03-04ProofpointKelsey Merriman, Selena Larson, Tommy Madjar
TA577’s Unusual Attack Chain Leads to NTLM Data Theft
2024-02-29CrowdStrikeJean-Philippe Teissier
The Anatomy of an ALPHA SPIDER Ransomware Attack
BlackCat Alpha Spider
2024-02-27BitdefenderAndrei Lapusneanu
When Stealers Converge: New Variant of Atomic Stealer in the Wild
AMOS
2024-02-22UptycsUptycs Threat Research
8220 Gang Cryptomining Campaign Targets Linux & Windows Platforms
Water Sigbin
2024-02-21Invoke REJosh Reynolds
Automating Qakbot Malware Analysis with Binary Ninja
QakBot
2024-02-21YouTube (Invoke RE)Josh Reynolds
Analyzing Qakbot Using Binary Ninja Automation Part 3
QakBot
2024-02-12Estrellas's BlogOtávio M.
Unveiling custom packers: A comprehensive guide
Dridex Simda
2024-02-09YouTube (Invoke RE)Josh Reynolds
Analyzing and Unpacking Qakbot Using Binary Ninja Automation Part 2
QakBot
2024-02-05PCriskTomas Meskauskas
How to remove CrackedCantil from the operating system
CrackedCantil
2024-01-25JSAC 2024Masafumi Takeda, Tomoya Furukawa
Threat Intelligence of Abused Public Post-Exploitation Frameworks
AsyncRAT DCRat Empire Downloader GRUNT Havoc Koadic Merlin PoshC2 Quasar RAT Sliver
2024-01-23YouTube (Invoke RE)Josh Reynolds
Analyzing and Unpacking Qakbot using Binary Ninja Automation
QakBot
2024-01-22SentinelOneAleksandar Milenkoski, Tom Hegel
ScarCruft | Attackers Gather Strategic Intelligence and Target Cybersecurity Professionals
Kimsuky
2024-01-15Russian Panda Research BlogRussianPanda
From Russia With Code: Disarming Atomic Stealer
AMOS
2024-01-10MalwarebytesJérôme Segura
Atomic Stealer rings in the new year with updated version
AMOS
2024-01-05IBMIBM X-Force Exchange
Tomb Crypter and ChrGetPdsi Stealer Analysis Report (INT00011701)
Broomstick ChrGetPdsi Stealer
2023-12-21ProofpointAxel F, Dusty Miller, Selena Larson, Tommy Madjar
BattleRoyal, DarkGate Cluster Spreads via Email and Fake Browser Updates
DarkGate
2023-12-14MandiantAdrian McCabe, Geoff Ackerman, Rufus Brown, Ryan Tomcik
Opening a Can of Whoop Ads: Detecting and Disrupting a Malvertising Campaign Distributing Backdoors
DanaBot DarkGate
2023-12-12MicrosoftMicrosoft Threat Intelligence
Threat actors misuse OAuth applications to automate financially driven attacks
Storm-1283 Storm-1286