Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-03-27Twitter (@embee_research)Embee_research
Uncovering Malicious Infrastructure with DNS Pivoting
LokiBot XWorm
2024-03-26Medium zyadlzyatsocZyad Elzyat
Comprehensive Analysis of EMOTET Malware: Part 1
Emotet
2024-03-26K7 SecurityVigneshwaran P
Unknown TTPs of Remcos RAT
Remcos
2024-03-26Palo Alto Networks Unit 42Unit 42
ASEAN Entities in the Spotlight: Chinese APT Group Targeting
PUBLOAD
2024-03-26LumenChris Formosa, Danny Adamitis, Ryan English, Steve Rudd
The Darkside Of TheMoon
TheMoon
2024-03-26EchoCTIBilal BAKARTEPE, bixploit
Agent Tesla Technical Analysis Report
Agent Tesla
2024-03-25ANY.RUNLena (LambdaMamba)
Reverse Engineering Snake Keylogger: Full .NET Malware Analysis Walkthrough
404 Keylogger GaboonGrabber
2024-03-25Github (veo)veo
vshell
Vshell
2024-03-25embeeresearchEmbee_research
Latrodectus Deobfuscation - Removal of Junk Comments and Self-Referencing Code
Latrodectus
2024-03-25iVerifyMatthias Frielingsdorf
Clipping Wings: Our Analysis of a Pegasus Spyware Sample
Chrysaor
2024-03-24SecuronixSecuronix
Analysis of DEV#POPPER: New Attack Campaign Targeting Software Developers Likely Associated With North Korean Threat Actors
BeaverTail
2024-03-24ViuleeenzAlessandro Strino
Understanding API Hashing and build a rainbow table for LummaStealer
Lumma Stealer
2024-03-22MandiantDan Black, Luke Jenkins
APT29 Uses WINELOADER to Target German Political Parties
WINELOADER
2024-03-22Palo AltoAnmol Maurya, Benjamin Chang, Goutam Tripathy, Pranay Kumar Chhaparwal, Vishwa Thothathri
Large-Scale StrelaStealer Campaign in Early 2024
StrelaStealer
2024-03-21cyber5wM4lcode
CryptNet Ransomware Detailed Analysis
CryptNET
2024-03-21ProofpointProofpoint Threat Research Team
Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign
2024-03-20MicrosoftSherrod DeGrippo
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you?
2024-03-20CISACyber Safety Review Board
Review of the Summer 2023 Microsoft Exchange Online Intrusion
Storm-0558
2024-03-20K7 SecurityShanmugasundharam E
Python Ciphering : Delving into Evil Ant’s Ransomware’s Tactics
Evil Ant
2024-03-19Medium b.magnezi0xMrMagnezi
Malware Analysis NjRat
NjRAT