Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-10-20Twitter (@embee_research)Embee_research
Decoding a Cobalt Strike .hta Loader Using CyberChef and Emulation
Cobalt Strike
2023-10-18Twitter (@embee_research)Embee_research
Ghidra Tutorial - Using Entropy To Locate a Cobalt Strike Decryption Function
Cobalt Strike
2023-10-12Cluster25Cluster25 Threat Intel Team
CVE-2023-38831 Exploited by Pro-Russia Hacking Groups in RU-UA Conflict Zone for Credential Harvesting Operations
Agent Tesla Crimson RAT Nanocore RAT SmokeLoader
2023-09-12ANSSIANSSI
FIN12: A Cybercriminal Group with Multiple Ransomware
BlackCat Cobalt Strike Conti Hive MimiKatz Nokoyawa Ransomware PLAY Royal Ransom Ryuk SystemBC
2023-09-04Cert-UACert-UA
APT28 cyberattack: msedge as a bootloader, TOR and mockbin.org/website.hook services as a control center (CERT-UA#7469)
2023-09-04AhnLabSanseo
CHM Malware Using Fukushima Contaminated Water Discharge: RedEyes (ScarCruft)
2023-08-08Security Service of UkraineSecurity Service of Ukraine
Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield
2023-08-07Trend MicroJunestherry Dela Cruz
Latest Batloader Campaigns Use Pyarmor Pro for Evasion
BATLOADER
2023-08-07SentinelOneAleksandar Milenkoski, Tom Hegel
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company
OpenCarrot
2023-07-25ZscalerMeghraj Nandanwar, Pradeep Mahato, Satyam Singh
Hibernating Qakbot: A Comprehensive Study and In-depth Campaign Analysis
QakBot
2023-07-07Rapid7 LabsCaitlin Condon
Exploitation of Mitel MiVoice Connect SA CVE-2022-29499
2023-07-04The RecordJonathan Greig
Fort Worth officials say leaked data came from Public Information Act request
SiegedSec
2023-06-23TrendmicroArianne Dela Cruz, Ieriz Nicolle Gonzalez, Ivan Nicole Chavez, Nathaniel Morales, Paul Pajares
An Overview of the Different Versions of the Trigona Ransomware
Trigona
2023-06-06Security IntelligenceAgnes Ramos-Beauchamp, Claire Zaboeva, Joshua Chung, Melissa Frydrych
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)
RokRAT
2023-05-18zimperiumNicolás Chiaraviglio
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy
OilAlpha
2023-05-16Check Point ResearchItay Cohen, Radoslaw Madej
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant
Horse Shell Camaro Dragon
2023-05-10DragosDragos
Deconstructing a Cybersecurity Event
2023-05-04SecurityScorecardVlad Pasca
How to Analyze Java Malware – A Case Study of STRRAT
STRRAT
2023-04-28Twitter (@MalGamy12)Gameel Ali
Tweet explaning similarity between Conti and Akira code
Akira
2023-04-26BitdefenderMartin Zugec
Unpacking BellaCiao: A Closer Look at Iran’s Latest Malware
BellaCiao