Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-210x1c0x1c
[0001] AmberAmethystDaisy -> QuartzBegonia -> LummaStealer
Lumma Stealer
2024-06-21ElasticJoe Desimone, Samir Bousseaden
GrimResource - Microsoft Management Console for initial access and evasion
Cobalt Strike
2024-06-20SOCRadarSOCRadar
Dark Web Profile: SpaceBears
SpaceBears
2024-06-20cocomelonccocomelonc
Linux malware development 1: Intro to kernel hacking. Simple C example.
2024-06-20CleafyFederico Valentini, Simone Mattia
Medusa Reborn: A New Compact Variant Discovered
Medusa TangleBot
2024-06-20Hunt.ioMichael R
Caught in the Act: Uncovering SpyNote in Unexpected Places
SpyNote
2024-06-19ANSSIANSSI
Malicious activities linked to the Nobelium intrusion set
WINELOADER
2024-06-19Joshua Penny, vc0RExor
Akira: The old-new style crime
Akira
2024-06-19BartBlaze, Nguyen Nguyen
New North Korean based backdoor packs a punch
NikiHTTP
2024-06-19Medium walmartglobaltechJason Reaves, Joshua Platt
Spectre (SPC) v9 Campaigns and Updates
Spectre Rat
2024-06-19AT&TFernando Dominguez
LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations
SquidLoader
2024-06-18MandiantMandiant
Cloaked and Covert: Uncovering UNC3886 Espionage Operations
2024-06-17TrellixAlejandro Houspanossian
Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion
HijackLoader Lumma Stealer
2024-06-17ProofpointProofpoint
From Clipboard to Compromise: A PowerShell Self-Pwn
DarkGate HijackLoader Lumma Stealer Matanbuchus NetSupportManager RAT TA571
2024-06-17BitSightJoão Batista
Latrodectus are you coming back
Latrodectus
2024-06-17Rapid7Rapid7
Malvertising Campaign Leads to Execution of Oyster Backdoor
Broomstick ChrGetPdsi Stealer
2024-06-16cocomelonccocomelonc
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-13Cisco TalosAsheer Malhotra, Gi7w0rm, Vitor Ventura
Operation Celestial Force employs mobile and desktop malware to target Indian entities
Gravity RAT Gravity RAT
2024-06-13Medium (@zyadlzyatsoc)Zyad Elzyat
Inside LATRODECTUS: A Dive into Malware Tactics and Mitigation
Latrodectus