Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-19AT&TFernando Dominguez
LevelBlue Labs Discovers Highly Evasive, New Loader Targeting Chinese Organizations
SquidLoader
2024-06-18MandiantMandiant
Cloaked and Covert: Uncovering UNC3886 Espionage Operations
2024-06-17splunkSplunk Threat Research Team
LNK or Swim: Analysis & Simulation of Recent LNK Phishing
2024-06-17CheckpointCheckpoint
17th June – Threat Intelligence Report
Sp1d3r UNC5537
2024-06-17CySecurity NewsCySecurity News
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum
Sp1d3r
2024-06-17Recorded FutureInsikt Group
The Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications
AMOS Rhadamanthys Stealc Markopolo
2024-06-17medium Andrew PetusAndrew Petus
Reverse Engineering Redosdru String Decryption
Redosdru
2024-06-17TrellixAlejandro Houspanossian
Info Stealing Campaign Uses DLL Sideloading Through Legitimate Cisco Webex’s Binaries for Initial Execution and Defense Evasion
HijackLoader Lumma Stealer
2024-06-17ProofpointProofpoint
From Clipboard to Compromise: A PowerShell Self-Pwn
DarkGate HijackLoader Lumma Stealer Matanbuchus NetSupportManager RAT TA571
2024-06-17BitSightJoão Batista
Latrodectus are you coming back
Latrodectus
2024-06-17Rapid7Rapid7
Malvertising Campaign Leads to Execution of Oyster Backdoor
Broomstick ChrGetPdsi Stealer
2024-06-16cocomelonccocomelonc
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-13IT Security GuruGuru
Guest Blog: Ox Security on learning from the Recent GitHub Extortion Campaigns
Gitloker
2024-06-13Github (LambdaMamba)Lena Yu
Implementation of C2 decryption
PrivateLoader
2024-06-13Github (LambdaMamba)Lena Yu
Implementation of a Config Decryptor for Amadey
Amadey
2024-06-13Cisco TalosAsheer Malhotra, Gi7w0rm, Vitor Ventura
Operation Celestial Force employs mobile and desktop malware to target Indian entities
Gravity RAT Gravity RAT
2024-06-13Medium (@zyadlzyatsoc)Zyad Elzyat
Inside LATRODECTUS: A Dive into Malware Tactics and Mitigation
Latrodectus
2024-06-13VolexityVolexity Threat Research
DISGOMOJI Malware Used to Target Indian Government
2024-06-12GoogleGoogle Threat Analysis Group, Mandiant
Insights on Cyber Threats Targeting Users and Enterprises in Brazil
TraderTraitor