Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-03-29CISACISA
Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
xzbot
2024-03-29Github (thesamsam)Sam James
Gist with XZ Backdoor analysis
xzbot
2024-03-29OpenwallAndres Freund
Initial email disclosing suspected backdoor in xz tarballs
xzbot
2024-03-29Github (VenzoV)VenzoV
GCleaner analysis with BinaryNinja
GCleaner
2024-03-29ElasticSamir Bousseaden
In- the- Wild Windows LPE 0- days: Insights & Detection Strategies
2024-03-28Fox-ITJoshua Kamp
Android Malware Vultur Expands Its Wingspan
Brunhilda Vultur
2024-03-27dissect.ingScottish Fold
Analyzing the new Donex Ransomware
Donex
2024-03-27EclecticIQArda Büyükkaya
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign
HackBrowserData
2024-03-27Twitter (@embee_research)Embee_research
Uncovering Malicious Infrastructure with DNS Pivoting
LokiBot XWorm
2024-03-26Medium zyadlzyatsocZyad Elzyat
Comprehensive Analysis of EMOTET Malware: Part 1
Emotet
2024-03-26K7 SecurityVigneshwaran P
Unknown TTPs of Remcos RAT
Remcos
2024-03-26Palo Alto Networks Unit 42Unit 42
ASEAN Entities in the Spotlight: Chinese APT Group Targeting
PUBLOAD
2024-03-26LumenChris Formosa, Danny Adamitis, Ryan English, Steve Rudd
The Darkside Of TheMoon
TheMoon
2024-03-26EchoCTIBilal BAKARTEPE, bixploit
Agent Tesla Technical Analysis Report
Agent Tesla
2024-03-25ANY.RUNLena (LambdaMamba)
Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough
404 Keylogger GaboonGrabber
2024-03-25Github (veo)veo
vshell
Vshell
2024-03-25embeeresearchEmbee_research
Latrodectus Deobfuscation - Removal of Junk Comments and Self-Referencing Code
Latrodectus
2024-03-25iVerifyMatthias Frielingsdorf
Clipping Wings: Our Analysis of a Pegasus Spyware Sample
Chrysaor
2024-03-24SecuronixSecuronix
Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors
BeaverTail
2024-03-24ViuleeenzAlessandro Strino
Understanding API Hashing and build a rainbow table for LummaStealer
Lumma Stealer