Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24Intel 471Intel 471
Android trojan TgToxic updates its capabilities
TgToxic
2025-02-24cocomelonccocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
OceanLotus DuQu StegoLoader
2025-02-24K7 SecuritySuresh Reddy
LCRYX Ransomware: How a VB Ransomware Locks Your System
LCRYX
2025-02-24Kaspersky LabsGeorgy Kucherin, João Godinho
The GitVenom campaign: cryptocurrency theft using GitHub
AsyncRAT Quasar RAT
2025-02-24Medium SlowMistSlowMist
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques
2025-02-23The GuardianJoanna Partridge
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’
2025-02-23Github (albertzsigovits)Albert Zsigovits
ToxicEye RAT config extraction and YARA signatures
ToxicEye
2025-02-22CrowdStrikeCrowdStrike
Curly Spider
UNC4393
2025-02-22CrowdStrikeCrowdStrike
Wandering Spider
Black Basta Black Basta GOLD REBELLION
2025-02-22CointelegraphVince Quill
Lazarus Group moves funds to multiple wallets as Bybit offers bounty
2025-02-21Medium SarvivaMalwareAnalystsarviya
Process Hollowing — Malware Reverse Engineering.
2025-02-21SonicWallSonicWall
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered
Remcos
2025-02-21Kaspersky LabsKaspersky
Angry Likho: Old beasts in a new forest
Lumma Stealer Angry Likho
2025-02-21TRM LabsTRM Insights
TRM Links North Korea to Record $1.5 Billion Record Hack
2025-02-21Twitter (@salmanvsf)Salman Shaikh
Tweet about VXPCrypter
2025-02-20Hunt.ioHunt.io
LightSpy Expands Command List to Include Social Media Platforms
lightSpy
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor PlugX ShadowPad Teleboyi
2025-02-20Cisco TalosCisco Talos
Weathering the storm: In the midst of a Typhoon
2025-02-20Cyber TriageChris Ray
WMI Malware: The Complete Forensics Guide
ShrinkLocker