Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-27BitSightAndré Tavares
Hunting PrivateLoader: The malware behind InstallsKey PPI service
PrivateLoader RisePro
2024-02-27Doubleagent.nethaxrob
GTPDOOR - A novel backdoor tailored for covert access over the roaming exchange
GTPDOOR
2024-02-27splunkSplunk Threat Research Team, Teoderick Contreras
Unveiling Phemedrone Stealer: Threat Analysis and Detections
Phemedrone Stealer
2024-02-27Github (VenzoV)VenzoV
Wikiloader part 3 -> Explorer shellcode
WikiLoader
2024-02-27ZscalerRoy Tay, Sudeep Singh
European diplomats targeted by SPIKEDWINE with WINELOADER
WINELOADER SPIKEDWINE
2024-02-26SpyCloudAshley Allocca, Kyla Cardona
“Pantsless Data”: Decoding Chinese Cybercrime TTPs
2024-02-26Twitter (@embee_research)Embee_research
Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples
NetSupportManager RAT
2024-02-26NCSC UKNCSC UK
SVR cyber actors adapt tactics for initial cloud access
2024-02-26cyber5wAmr Ashraf
Pikabot Loader Detailed Analysis
Pikabot
2024-02-23ElasticDaniel Stepanic, Salim Bitam
PIKABOT, I choose you!
Pikabot
2024-02-22SentinelOneAleksandar Milenkoski
Doppelgänger | Russia-Aligned Influence Operation Targets Germany
2024-02-22SekoiaThreat & Detection Research Team
Scattered Spider laying new eggs
BlackCat
2024-02-21Invoke REJosh Reynolds
Automating Qakbot Malware Analysis with Binary Ninja
QakBot
2024-02-21YouTube (SentinelOne)Kris McConkey
LABSCon23 Replay | Chasing Shadows | The rise of a prolific espionage actor
9002 RAT PlugX ShadowPad Spyder Earth Lusca
2024-02-21CrowdStrikeCrowdStrike
CrowdStrike Global Threat Report 2024
2024-02-21DCSOJiro Minier, Johann Aydinbas, Kritika Roy, Olivia Hayward
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer
Konni
2024-02-21YouTube (Invoke RE)Josh Reynolds
Analyzing Qakbot Using Binary Ninja Automation Part 3
QakBot
2024-02-20ANY.RUNJack Zalesskiy
Understanding Macros in Malware: Types, Capabilities, Case Study
2024-02-19AhnLabAhnLab SEcurity intelligence Center
Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant)
Nood RAT
2024-02-19Lab52Lab52
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)
Pelmeni