Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-06-05Cisco TalosCisco Talos
DarkGate switches up its tactics with new payload, email templates
DarkGate
2024-06-04AquasecNitzan Yaakov
Muhstik Malware Targets Message Queuing Services Applications
Tsunami
2024-06-04Cert-UACert-UA
UAC-0200: Targeted cyberattacks using DarkCrystal RAT and Signal as a trusted distribution vehicle (CERT-UA#9918)
DCRat
2024-06-03SpyCloudJames
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft
AMOS
2024-06-03SekoiaPierre Le Bourhis, Quentin Bourgue, Sekoia TDR
PikaBot: a Guide to its Deep Secrets and Operations
Pikabot
2024-05-31Cybersecurity InsidersBogdan Glushko
Proven Data Restores PowerHost’s VMware Backups After SEXi Ransomware Attack
SEXi SEXi
2024-05-30CloudflareCloudforce One
Disrupting FlyingYeti's campaign targeting Ukraine
COOKBOX FlyingYeti
2024-05-30Recorded FutureInsikt Group
GRU’s BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns
Mocky LNK
2024-05-30Recorded FutureInsikt Group
GRU's BlueDelta Targets Key Networks in Europe with Multi-Phase Espionage Campaigns
Mocky LNK
2024-05-30CloudflareCloudforce One
Disrupting FlyingYeti's campaign targeting Ukraine
FlyingYeti
2024-05-30Cisco TalosAsheer Malhotra
LilacSquid: The stealthy trilogy of PurpleInk, InkBox and InkLoader
purpleink LilacSquid
2024-05-30LumenBlack Lotus Labs
The Pumpkin Eclipse
Chalubo
2024-05-30Trend MicroSunil Bharti
Decoding Water Sigbin's Latest Obfuscation Tricks
Water Sigbin
2024-05-30Hunt.ioHunt.io
SolarMarker: Hunt Insights and Findings
solarmarker
2024-05-30AkamaiMaxim Zavodchik, Ryan Barnett, Stiv Kupchik
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
RedTail
2024-05-30CenturylinkBlack Lotus Labs
The Pumpkin Eclipse
Chalubo
2024-05-30circleidWhoisXML API
A DNS Investigation of the Phobos Ransomware 8Base Attack
8Base Phobos
2024-05-29eSentireeSentire
Fake Browser Updates delivering BitRAT and Lumma Stealer
BitRAT Lumma Stealer
2024-05-28HarfangLabHarfangLab CTR
AllaSenha: AllaKore variant leverages Azure cloud C2 to steal banking details in Latin America
AllaKore AllaSenha