Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-02-27SekoiaThreat & Detection Research Team
Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 2
Stealc
2023-02-20SekoiaThreat & Detection Research Team
Stealc: a copycat of Vidar and Raccoon infostealers gaining in popularity – Part 1
Stealc
2023-01-24DailySecUGil Min-kwon
[Urgent] A Chinese hacker organization that declared hacking war on Korea..."KISA will hack" notice
2023-01-17TrendmicroJunestherry Dela Cruz
Batloader Malware Abuses Legitimate Tools, Uses Obfuscated JavaScript Files in Q4 2022 Attacks
BATLOADER
2023-01-12CynetKindra Cantrell
CyOps Lighthouse: Vidar Stealer
Vidar
2023-01-10SecurityScorecardVlad Pasca
How to Analyze JavaScript Malware – A Case Study of Vjw0rm
Vjw0rm
2023-01-05LogpointAnish Bogati
A crowning achievement: Exploring the exploit of Royal ransomware
Royal Ransom
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Rise of Dark Power: A Close Look at the Group and their Ransomware
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector
RokRAT
2022-12-12Trend MicroAlfredo Oliveira, David Fiser
Linux Cryptocurrency Mining Attacks Enhanced via CHAOS RAT
Chaos
2022-12-07cybleCyble
A Closer Look At BlackMagic Ransomware
BlackMagic
2022-11-16ProofpointAxel F, Pim Trouerbach
A Comprehensive Look at Emotet Virus’ Fall 2022 Return
BumbleBee Emotet PHOTOLITE
2022-10-31The RecordAlexander Martin
Mondelez and Zurich reach settlement in NotPetya cyberattack insurance suit
EternalPetya
2022-09-30NCC GroupMichael Mullen, Nikolaos Pantazopoulos, William Backhouse
A glimpse into the shadowy realm of a Chinese APT: detailed analysis of a ShadowPad intrusion
ShadowPad
2022-09-29Perception PointIgal Lytzki
Doenerium: It’s Not a Crime to Steal From Thieves
doenerium
2022-09-22Sentinel LABSTom Hegel
Void Balaur | The Sprawling Infrastructure of a Careless Mercenary
Void Balaur
2022-08-31BitdefenderMartin Zugec
Deep Dive into a Corporate Espionage Operation
2022-08-25BitdefenderAlexandru Maximciuc, Victor Vrabie
Hiding in the Shadows: Investigation of a Corporate Espionage Attack
2022-08-25Trend MicroBahaa Yamany, Earle Maui Earnshaw, Jay Yaneza, Jeffrey Francis Bonaobra, Mohamed Fahmy, Nathaniel Gregory Ragasa
New Golang Ransomware Agenda Customizes Attacks (IoCs)
AgendaCrypt
2022-08-25Trend MicroBahaa Yamany, Earle Maui Earnshaw, Jay Yaneza, Jeffrey Francis Bonaobra, Mohamed Fahmy, Nathaniel Gregory Ragasa
New Golang Ransomware Agenda Customizes Attacks
AgendaCrypt