Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-11-21Avast DecodedJan Rubín
ViperSoftX: Hiding in System Logs and Spreading VenomSoftX
ViperSoftX
2022-11-21ZscalerSudeep Singh
Black Friday Alert: 4 Emerging Skimming Attacks to Watch for This Holiday Season
magecart
2022-11-21Marco Ramilli's BlogMarco Ramilli
Is Hagga Threat Actor Abusing FSociety Framework ?
2022-11-19MalwarologyRobert Simmons
Malicious Packer pkr_ce1a
SmokeLoader Vidar
2022-11-18Trend MicroNick Dai, Sunny Lu, Vickie Su
Earth Preta Spear-Phishing Governments Worldwide
PUBLOAD TONESHELL MUSTANG PANDA
2022-11-18Atlantic CouncilJustin Sherman
GRU 26165: The Russian cyber unit that hacks targets on-site
EternalPetya
2022-11-18Palo Alto Networks Unit 42Akshata Rao, Wenjun Hu, Zong-Yu Wu
An AI Based Solution to Detecting the DoubleZero .NET Wiper
DoubleZero
2022-11-18Cyble
AXLocker, Octocrypt, and Alice: Leading a new wave of Ransomware Campaigns
AXLocker
2022-11-17Cisco TalosChris Neal
Get a Loda This: LodaRAT meets new friends
Loda Kasablanka
2022-11-17Cyber ShafaratTreadstone 71
KromSec outs AnonOpsSE as Iranian regime – Makes statement
KromSec
2022-11-17TrellixTrelix
Trellix Insights: SmokeLoader Exploits Old Vulnerabilities to Drop zgRAT
SmokeLoader zgRAT
2022-11-17LAC WATCHYoshihiro Ishikawa
China-based Mustang Panda is a targeted attack with malware "Claimloader", may affect Japan
PUBLOAD
2022-11-17MicrosoftMicrosoft Security Threat Intelligence
DEV-0569 finds new ways to deliver Royal ransomware, various payloads
Royal Ransom DEV-0569
2022-11-17YoroiCarmelo Ragusa, Luigi Martire
Reconstructing the last activities of Royal Ransomware
Royal Ransom
2022-11-16XDA ForumsDesktopECHO
Owner of an Android TV box? May want to check if it's an active botnet member...
BADBOX
2022-11-16ProofpointAxel F, Pim Trouerbach
A Comprehensive Look at Emotet Virus’ Fall 2022 Return
BumbleBee Emotet PHOTOLITE
2022-11-16splunkSplunk Threat Research Team
Inside the Mind of a ‘Rat’ - Agent Tesla Detection and Analysis
Agent Tesla
2022-11-16cocomelonccocomelonc
Malware development: persistence - part 19. Disk Cleanup Utility. Simple C++ example.
2022-11-16Ruptura InfoSecurityRad Kawar
Writing Tiny, Stealthy & Reliable Malware
2022-11-16Medium (@DCSO_CyTec)Axel Wauer, Johann Aydinbas
HZ RAT goes China
HZ RAT