Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-19Emanuele De Lucia on SecurityEmanuele De Lucia
“Hey ESET, Wait for the Leak”: Dissecting the “OctoberSeventh” Wiper targeting ESET customers in Israel
OctoberSeventh
2024-10-19ElasticSalim Bitam
Tricks and Treats: GHOSTPULSE’s new pixel- level deception
HijackLoader
2024-10-18NetskopeLeandro Froes
New Bumblebee Loader Infection Chain Signals Possible Resurgence
BumbleBee
2024-10-18SpyCloudKyla Cardona
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem
2024-10-17SekoiaQuentin Bourgue, Sekoia TDR
ClickFix tactic: The Phantom Meet
Rhadamanthys Stealc
2024-10-17Cisco TalosAsheer Malhotra, Dmytro Korzhevin, Vanja Svajcer, Vitor Ventura
UAT-5647 targets Ukrainian and Polish entities with RomCom malware variants
MeltingClaw ROMCOM RAT ShadyHammock RomCom
2024-10-17Loader Insight AgencyLIA
Correlating Vidar Stealer Build IDs Based on Loader Tasks
Lumma Stealer SmokeLoader Vidar
2024-10-17Hunt.ioHunt.io
From Warm to Burned: Shedding Light on Updated WarmCookie Infrastructure
WarmCookie
2024-10-16nao_secnao_sec
IcePeony with the '996' work culture
IceCache IceEvent IcePeony
2024-10-16BitSightAndré Tavares
Exfiltration over Telegram Bots: Skidding Infostealer Logs
404 Keylogger Agent Tesla
2024-10-16Trend MicroJaromír Hořejší, Nitesh Surana
Fake LockBit, Real Damage: Ransomware Samples Abuse AWS S3 to Steal Data
BockLit
2024-10-16ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
X-ZIGZAG Technical Malware Analysis Report
AsyncRAT X-ZIGZAG
2024-10-15MicrosoftAkash Chaudhuri, Gourav Khandelwal, Krithika Ramakrishnan, Matthew Mesa, Sagar Patil, Uri Oren
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack
UNC4393
2024-10-15Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-35 (belly brain worm) against a manufacturing company in South Asia
Unidentified 117 (Donot Loader)
2024-10-14Trend MicroAdremel Redondo, Adriel Isidro, Andre Filipe Codod, Charles Adrian Marty, Christian Alpuerto, Kim Benedict Victorio, Lorenzo Laureano, Mark Jason Co
Water Makara Uses Obfuscated JavaScript in Spear Phishing Campaign, Targets Brazil With Astaroth Malware
Astaroth Water Makara
2024-10-13ElasticRemco Sprooten, Ruben Groenewoud
Declawing PUMAKIT
PUMAKIT
2024-10-11HarfangLabAlice Climent-Pommeret
HijackLoader evolution: abusing genuine signing certificates
HijackLoader
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against Middle East
STEALHOOK OilRig
2024-10-11zimperiumAazim Yaswant
Expanding the Investigation: Deep Dive into Latest TrickMo Samples
TrickMo
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
STEALHOOK