Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-06MorphisecArnold Osipov
Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks
Angry Likho
2024-06-05QurakslabFabrice Rossi, Florian Yger, Riccardo Mori, Robin David, Roxane Cohen
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Slides)
2024-06-05QuarksLabFabrice Rossi, Florian Yger, Riccardo Mori, Robin David, Roxane Cohen
QBinDiff: A modular differ to enhance binary diffing and graph alignment (Video)
2024-05-22Kaspersky LabsGReAT
Stealers, stealers and more stealers
2024-04-24NCSC UKNCSC UK
Line Dancer - In-memory shellcode loader targeting Cisco Adaptive Security Appliance (ASA) devices.
2024-04-21Trend MicroNathaniel Morales, Sarah Pearl Camiling
FOG Ransomware Spread by Cybercriminals Claiming Ties to DOGE
Fog
2024-04-15Positive TechnologiesAleksandr Badaev, Kseniya Naumova
SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world
LokiBot 404 Keylogger Agent Tesla CloudEyE Formbook Remcos XWorm
2024-02-05ReutersMichael Perry, Neil Jerome Morales
Philippines wards off cyber attacks from China-based hackers
2024-01-18M4lcode, Mostafa Farghaly
Detect Mortis Locker Ransomware with YARA
Mortis
2024-01-18MorphisecArnold Osipov
Chae$ Chronicles: Version 4.1 Dedicated to Morphisec Researchers
Chaes
2024-01-18MorphisecArnold Osipov
Chae$ Chronicles: Version 4.1 Dedicated to Morphisec Researchers
Chaes
2024-01-10VolexityMatthew Meltzer, Robert Jan Mora, Sean Koessel, Steven Adair, Thomas Lancaster
Active Exploitation of Two Zero-Day Vulnerabilities in Ivanti Connect Secure VPN
UTA0178
2024-01-08SOCRadarSOCRadar
Mastercard Data Leak, New Fully Undetectable Ransomware, Elusive Stealer Source Code Leak, and More
TOXCAR CYBER TEAM
2023-12-21Martin Clauß, Valentin Obst
BPF Memory Forensics with Volatility 3
BPFDoor TripleCross
2023-11-03Aqua NautilusAssaf Morag
Looney Tunables Vulnerability Exploited by Kinsing
Kinsing WSO
2023-11-01Twitter (@embee_research)Embee_research
Malware Unpacking With Memory Dumps - Intermediate Methods (Pe-Sieve, Process Hacker, Hxd and Pe-bear)
AsyncRAT
2023-10-18GoogleKate Morgan
Government-backed actors exploiting WinRAR vulnerability
APT40
2023-10-03Luca Mella
Lighting the Exfiltration Infrastructure of a LockBit Affiliate (and more)
LockBit LockBit Conti LockBit
2023-10-01r-tecSven Rath
.NET Assembly Obfuscation for Memory Scanner Evasion
2023-09-22R136a1Dominik Reichel
More on DreamLand
LuaDream