Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-26ISH Tecnologia0x0d4y, Ismael Rocha
ffdgf
Lynx
2025-03-26Youtube (greenplan)greenplan
[BINARY REFINERY] (StegoCampaign) - Deobfuscation of a VBScript stage (PART 1)
2025-03-26Cisco TalosCisco Talos
Year in Review
2025-03-26ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report
AsyncRAT
2025-03-26ZscalerBrett Stone-Gross
CoffeeLoader: A Brew of Stealthy Techniques
CoffeeLoader
2025-03-26Twitter (@MalGamy12)Gameel Ali
Tweet about RALord ransomware
RALord
2025-03-25GoDaddyDenis Sinegubko
Inside DollyWay’s C2 Infrastructure: Traffic Direction Systems and the LosPollos Connection
DollyWay
2025-03-25Suresh Reddy
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads
2025-03-25Youtube (greenplan)greenplan
[BINARY REFINERY] (StegoCampaign) - Scrittura di una Unit per ottenere il C2
2025-03-25IBM X-ForceGolo Mühr
IBM X-Force discovers new Sheriff Backdoor used to target Ukraine
Deputy Sheriff
2025-03-25JPCERT/CCHayato Sasaki
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup
2025-03-25DomainToolsDomainTools
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict
2025-03-25Kaspersky LabsBoris Larin, Igor Kuznetsov
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain
Operation ForumTroll
2025-03-25SpyCloudJames
On the Hunt for Ghost(Socks)
GhostSocks
2025-03-24BroadcomBroadcom
SVCStealer malware
SVCStealer
2025-03-24Rewterz Information SecurityRewterz Information Security
SvcStealer Malware Targeting Users to Extract Sensitive Data from Browsers and Applications – Active IOCs
SVCStealer
2025-03-24SYGNIASygnia Team
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation
CHINACHOPPER reGeorg
2025-03-23AviaBAviaB
Analyzing Vidar Stealer
Vidar
2025-03-22Trend MicroJunestherry Dela Cruz
Back to Business: Lumma Stealer Returns with Stealthier Methods
Lumma Stealer
2025-03-21SeqriteManoj Neelamegam
SVC New Stealer on the Horizon
SVCStealer