Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2021-04-19nvisoJeroen Beckers
How to analyze mobile malware: a Cabassous/FluBot Case study
FluBot
2021-04-19Youtube (AhmedS Kasmani)AhmedS Kasmani
Malware Analysis of a Password Stealer
Poulight Stealer
2021-04-19Washington ExaminerTom Rogan
Inside the CIA and NSA disagreement over Russian bounties story
2021-04-19AnomaliGage Mele, Tara Gould, Yury Polozov
PRIMITIVE BEAR (Gamaredon) Targets Ukraine with Timely Themes
2021-04-19NEW YORKEREd Caesar
The Incredible Rise of North Korea’s Hacking Army
2021-04-19Sentinel LABSMarco Figueroa
A Deep Dive into Zebrocy’s Dropper Docs
Downdelph
2021-04-19InfoSec Handlers Diary BlogJan Kopriva
Hunting phishing websites with favicon hashes
2021-04-19Twitter (@_alex_il_)Alex Ilgayev
Tweet on QakBot's additional decryption mechanism
QakBot
2021-04-19Intel 471Intel 471
How China’s cybercrime underground is making money off big data
2021-04-19NetresecErik Hjelmvik
Analysing a malware PCAP with IcedID and Cobalt Strike traffic
Cobalt Strike IcedID
2021-04-19Medium elis531989Eli Salem
Dancing With Shellcodes: Cracking the latest version of Guloader
CloudEyE
2021-04-19CERT NZCERT NZ
Microsoft 365 phishing using fake voicemail messages
2021-04-18Bleeping ComputerLawrence Abrams
Discord Nitro gift codes now demanded as ransomware payments
Nitro
2021-04-18BBCBBC Podcast
1. Hacking Hollywood
2021-04-18Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Recover your files with StrongPity
StrongPity
2021-04-18xorl %eax, %eaxAnastasios Pingios
US Cyber Operations Groups
2021-04-18YouTube (dist67)Didier Stevens
Decoding Cobalt Strike Traffic
Cobalt Strike
2021-04-18Twitter (@ViriBack)ViriBack
Tweet on Seth Loader
2021-04-17YouTube (Worcester DEFCON Group)Joel Snape, Nettitude
Inside IcedID: Anatomy Of An Infostealer
IcedID
2021-04-17Gru.gqthegrugq
SVR snaps back at Biden