Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-13ANY.RUNAaron Jornet Sales, ANY.RUN
HawkEye Malware: Technical Analysis
HawkEye Keylogger
2024-11-13SekoiaColine Chavane, Sekoia TDR
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats
2024-11-13TEHTRISTEHTRIS
Cracking Formbook malware: Blind deobfuscation and quick response techniques
Formbook
2024-11-13BitdefenderMartin Zugec
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
ShrinkLocker
2024-11-13ClearSkyClearSky
CVE-2024-43451: A New Zero-Day Vulnerability Exploited in the wild
SparkRAT UAC-0194
2024-11-12ClearSkyClearSky Research Team
Iranian “Dream Job” Campaign 11.24
TA455
2024-11-12KrollGeorge Glass, Ryan Hicks
LUMMASTEALER Delivered Via PowerShell Social Engineering
Lumma Stealer
2024-11-12BlackberryBlackBerry Research & Intelligence Team
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
DEEPDATA
2024-11-12Recorded FutureInsikt Group
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
Cobalt Strike TAG-112
2024-11-12QianxinAlex Turing
New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9
Melofee
2024-11-12Recorded FutureInsikt Group
China-Nexus TAG-112 Compromises Tibetan Websites to Distribute Cobalt Strike
Cobalt Strike
2024-11-12SecurityScorecardRyan Sherstobitoff
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
2024-11-12Hunt.ioHunt.io
Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Sliver
2024-11-12DataBreaches.netDissent
Amazon confirms employee data breach after vendor hack
Nam3L3ss
2024-11-11KasperskyAshley Muñoz, Cristian Souza, Eduardo Ovalle
Ymir: new stealthy ransomware in the wild
Ymir
2024-11-10cocomelonccocomelonc
Malware and cryptography 34: encrypt payload via DFC algorithm. Simple C example.
2024-11-10DFIR.chStephan Berger
Reptile's Custom Kernel-Module Launcher
reptile
2024-11-09Youtube (Microsoft Security Response Center (MSRC))Rachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0506 TA2101
2024-11-09MicrosoftRachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0826
2024-11-08FortinetXiaopeng Zhang
New Campaign Uses Remcos RAT to Exploit Victims
Remcos