Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-25HiSolutionsNicolas Sprenger
How to detect the modular RAT CSHARP-STREAMER
csharp-streamer RAT
2024-06-25Cado SecurityNate Bill
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect
2024-06-24Recorded FutureInsikt Group
Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation
RedJuliett
2024-06-24CySecurity NewsCySecurity News
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code
IntelBroker
2024-06-24KrollDave Truman
Novel Technique Combination Used In IDATLOADER Distribution
Emmenhtal HijackLoader
2024-06-24SonicWallSonicWall
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe
StrelaStealer
2024-06-24Malwarebytes LabsJérôme Segura
‘Poseidon’ Mac stealer distributed via Google ads
Poseidon Stealer
2024-06-24RevEng.AIRevEng.AI
Latrodectus Affiliate Resumes Operations Using Brute Ratel C4 Post Operation Endgame
Brute Ratel C4 Latrodectus
2024-06-24GootLoader Wordpressgootloadersites
Gootloader’s New Hideout Revealed: The Malware Hunt in WordPress’ Shadows
GootLoader
2024-06-21Cisco TalosAshley Shen, Chetan Raghuprasad
SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques
SneakyChef
2024-06-21Group-IBGroup-IB
Boolka Unveiled: From web attacks to modular malware
BMANAGER Boolka
2024-06-21Malwarebytes LabsPieter Arntz
Was T-Mobile compromised by a zero-day in Jira?
IntelBroker
2024-06-210x1c0x1c
[0001] AmberAmethystDaisy -> QuartzBegonia -> LummaStealer
Lumma Stealer
2024-06-21ElasticJoe Desimone, Samir Bousseaden
GrimResource - Microsoft Management Console for initial access and evasion
Cobalt Strike
2024-06-20DARKReadingElizabeth Montalbano
'Vortax' Meeting Software Builds Elaborate Branding, Spreads Infostealers
Markopolo
2024-06-20cocomelonccocomelonc
Linux malware development 1: Intro to kernel hacking. Simple C example.
2024-06-20CleafyFederico Valentini, Simone Mattia
Medusa Reborn: A New Compact Variant Discovered
Medusa TangleBot
2024-06-20Hunt.ioMichael R
Caught in the Act: Uncovering SpyNote in Unexpected Places
SpyNote
2024-06-19Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi, Peter Girnus
Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework
ValleyRAT Void Arachne
2024-06-19ANSSIANSSI
Malicious activities linked to the Nobelium intrusion set
WINELOADER