Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-23Github (albertzsigovits)Albert Zsigovits
ToxicEye RAT config extraction and YARA signatures
ToxicEye
2025-02-22Youtube (greenplan)greenplan
[BINARY REFINERY] (MintsLoader) - Deobfuscation of a simple XOR to get the URL
MintsLoader
2025-02-21cyjaxCymon
How’s that for a malicious Linkc, new group launches DLS
LinkC Pub
2025-02-21SonicWallSonicWall
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered
Remcos
2025-02-20RedHotCyberPietro Melillo
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
LinkC Pub
2025-02-20Hunt.ioHunt.io
LightSpy Expands Command List to Include Social Media Platforms
lightSpy
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor PlugX ShadowPad Teleboyi
2025-02-20Cisco TalosCisco Talos
Weathering the storm: In the midst of a Typhoon
2025-02-20ReliaquestJohn Dilgen
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses
ReedBed
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor NailaoLocker PlugX ShadowPad
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-20Silent PushSilent Push
Tweet on Tracking ValleyRAT Domains with ICP Licenses
ValleyRAT
2025-02-20InfrawatchInfrawatch Research Team
GhostSocks - Lumma's Partner In Proxy
GhostSocks Lumma Stealer
2025-02-19Natto ThoughtsEugenio Benincasa
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities
2025-02-18inversecosLina Lau
An inside look at NSA (Equation Group) TTPs from China’s lense
SECONDDATE
2025-02-18ProofpointProofpoint Threat Research Team
An Update on Fake Updates: Two New Actors, and New Mac Malware
Marcher FAKEUPDATES FrigidStealer Lumma Stealer
2025-02-15Youtube (greenplan)greenplan
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm
Emmenhtal
2025-02-13ZscalerThreatLabZ research team, Zscaler
Technical Analysis of Xloader Versions 6 and 7 | Part 2
Xloader
2025-02-13SecuronixDen Iyzvyk, Tim Peck
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
RandomQuery