Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-13cocomelonccocomelonc
Malware development: persistence - part 25. Create symlink from legit to evil. Simple C example.
2024-07-11Orange CyberdefenseSimon Vernin
R0BL0CH0N TDS: A deep dive into the infrastructure of an affiliate marketing scam
2024-07-11GoogleDianaE
Finding Malware: Detecting EMPTYSPACE with Google Security Operations
Vetta Loader
2024-07-11ZscalerSudeep Singh, Yin Hong Chang
MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2
MoonWalk
2024-07-11sysdigMiguel Hernández
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools
CRYSTALRAY
2024-07-11McAfeeVignesh Dhatchanamoorthy, Yashvi Shah
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
DarkGate Lumma Stealer
2024-07-10ZscalerSudeep Singh, Yin Hong Chang
DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1
Cobalt Strike DUSTPAN DUSTTRAP
2024-07-10Risky.bizCatalin Cimpanu
Risky Biz News: US takes down RT's Twitter bot farm
Lifting Zmiy
2024-07-09US Department of JusticeOffice of Public Affairs
Justice Department Leads Efforts Among Federal, International, and Private Sector Partners to Disrupt Covert Russian Government-Operated Social Media Bot Farm
2024-07-09Twitter (@H4ckManac)HackManac
Tweet on data breaches caused by 888 group
Threat Actor 888
2024-07-09SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update January to June 2024
Coper FluBot Hook Bashlite Mirai FAKEUPDATES AsyncRAT BianLian Cobalt Strike DCRat Havoc NjRAT QakBot Quasar RAT RedLine Stealer Remcos Rhadamanthys RisePro Sliver
2024-07-08Kaspersky LabsGReAT
CloudSorcerer – A new APT targeting Russian government entities
CloudSorcerer
2024-07-06unknown
xeno-RAT open-source remote access tool (RAT)
XenoRAT
2024-07-05Weixin360 Threat Intelligence Center
APT-C-26 (Lazarus) uses PyPI to attack Windows, Linux, and macOS platforms
SimpleTea SimpleTea
2024-07-05CloudwaysAbdul Rehman
Hacker Allegedly Leaks Data from Shopify Breach on BreachForums
Threat Actor 888
2024-07-05KrollRyan Hicks
CLEARFAKE Update Tricks Victim into Executing Malicious PowerShell Code
ClearFake
2024-07-02Malsada TechAaron Samala, April Bucaneg, Casey Kuwada
The LandUpdate808 Fake Update Variant
KongTuke
2024-07-02K7 SecurityArunkumar
Kematian Stealer forked from PowerShell Token Grabber
Kematian Stealer
2024-07-02SekoiaQuentin Bourgue
Exposing FakeBat loader: distribution methods and adversary infrastructure
BlackCat Royal Ransom EugenLoader Carbanak Cobalt Strike DICELOADER Gozi IcedID Lumma Stealer NetSupportManager RAT Pikabot RedLine Stealer SectopRAT Sliver SmokeLoader Vidar
2024-07-01Speakerdeck (takahiro_haruyama)Takahiro Haruyama
The Art of Malware C2 Scanning - How to Reverse and Emulate Protocol Obfuscated by Compiler
DOPLUGS Hodur