Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-08-16Infinitum ITinfinitum IT
FluBot Android Malware Analysis
FluBot
2022-08-15MicrosoftDigital Threat Analysis Center (DTAC), Microsoft Threat Intelligence Center (MSTIC), Office 365 Threat Research Team
Disrupting SEABORGIUM’s ongoing phishing operations
Callisto
2022-08-15WeixinKnow Chuangyu
Analysis of the characteristics of new activities organized by Patchwork APT in South Asia
2022-08-15MicrosoftDigital Threat Analysis Center (DTAC), Microsoft Threat Intelligence Center (MSTIC), Office 365 Threat Research Team
Disrupting SEABORGIUM’s ongoing phishing operations
2022-08-13AlienVault OTXAlienVault
An Analysis of Infrastructure linked to the Hagga Threat Actor
Hagga
2022-08-13SilentpushSilent Push
Early Analysis of the Twilio phishing attack-it is the tip of the iceberg
2022-08-11xanhacks' infosec blogxanhacks
MoqHao Android malware analysis and phishing campaign
MoqHao
2022-08-08AhnLabASEC Analysis Team
Monero CoinMiner Being Distributed via Webhards
Monero Miner
2022-08-050xIvanTwitter (@viljoenivan)
LokiBot Analysis
Loki Password Stealer (PWS)
2022-08-04ZscalerStuti Chaturvedi
X-FILES Stealer Evolution - An Analysis and Comparison Study
X-Files Stealer
2022-08-04CloudsekAastha Mittal, Anandeshwar Unnikrishnan
Technical Analysis of Bumblebee Malware Loader
BumbleBee
2022-08-03AhnLabASEC Analysis Team
Gwisin Ransomware Targeting Korean Companies
Gwisin
2022-08-02Youtube (Guided Hacking)Fred HK, Guided Hacking
Paradies Clipper - Crypto Jacker Malware Analysis
Paradies Clipper
2022-08-02ASECASEC Analysis Team
Word File Provided as External Link When Replying to Attacker’s Email (Kimsuky)
Kimsuky
2022-08-01ZscalerAtinderpal Singh
Technical Analysis of Industrial Spy Ransomware
Industrial Spy
2022-08-01SecurityScorecardVlad Pasca
A Detailed Analysis of the RedLine Stealer
RedLine Stealer
2022-08-01SecurityScorecardVlad Pasca
A Detailed Analysis of the RedLine Stealer
RedLine Stealer
2022-07-27ReversingLabsJoseph Edwards
Threat analysis: Follina exploit fuels 'live-off-the-land' attacks
Cobalt Strike MimiKatz
2022-07-25muha2xmadMuhammad Hasan Ali
PDF Analysis of Lokibot malware
LokiBot
2022-07-22PWC UKKrystle Reid
Old cat, new tricks, bad habits An analysis of Charming Kitten’s new tools and OPSEC errors
TelegramGrabber