Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-01ThreatMonKerime Gencay
RisePro Stealer Malware Analysis Report
RisePro
2024-03-31Check Point ResearchCheck Point
Malware Spotlight: Linodas aka DinodasRAT for Linux
Linodas
2024-03-31Github (karcherm)Michael Karcher
Information about the liblzma (xz-utils) backdoor
xzbot
2024-03-30Gynvael.Coldwind//vx.logGynvael Coldwind
xz/liblzma: Bash-stage Obfuscation Explained
xzbot
2024-03-29CISACISA
Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
xzbot
2024-03-29ElasticSamir Bousseaden
In- the- Wild Windows LPE 0- days: Insights & Detection Strategies
2024-03-28The RecordDaryna Antoniuk
Russian researchers say espionage operation using WinRAR bug is linked to Ukraine
Head Mare
2024-03-27Cyfirmacyfirma
Sync-Scheduler: A Dedicated Document Stealer
Sync-Scheduler
2024-03-27EclecticIQArda Büyükkaya
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign
HackBrowserData
2024-03-26Medium zyadlzyatsocZyad Elzyat
Comprehensive Analysis of EMOTET Malware: Part 1
Emotet
2024-03-26K7 SecurityVigneshwaran P
Unknown TTPs of Remcos RAT
Remcos
2024-03-25embeeresearchEmbee_research
Latrodectus Deobfuscation - Removal of Junk Comments and Self-Referencing Code
Latrodectus
2024-03-25iVerifyMatthias Frielingsdorf
Clipping Wings: Our Analysis of a Pegasus Spyware Sample
Chrysaor
2024-03-24SecuronixSecuronix
Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors
BeaverTail
2024-03-22Palo AltoAnmol Maurya, Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Vishwa Thothathri
Large-Scale StrelaStealer Campaign in Early 2024
StrelaStealer
2024-03-21ProofpointProofpoint Threat Research Team
Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign
2024-03-20MicrosoftSherrod DeGrippo
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you?
2024-03-19Medium b.magnezi0xMrMagnezi
Malware Analysis NjRat
NjRAT
2024-03-18SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Analysis of New DEEP#GOSU Attack Campaign Likely Associated with North Korean Kimsuky Targeting Victims with Stealthy Malware
RandomQuery
2024-03-18Trend MicroDaniel Lunghi, Joseph C Chen
Earth Krahang Exploits Intergovernmental Trust to Launch Cross-Government Attacks
DinodasRAT PlugX Reshell ShadowPad Earth Krahang