Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-12GdataAnna Lvova, Karsten Hahn
New backdoor BadSpace delivered by high-ranking infected websites
WarmCookie
2024-06-11KrollGeorge Glass, Keith Wojcieszek, Laurie Iacono
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability
PLAY
2024-06-11Invoke REJosh Reynolds
Parser Script for Havoc Config
Havoc
2024-06-11ZscalerThreatLabZ research team
A Brief History of SmokeLoader, Part 1
SmokeLoader
2024-06-10cybleCyble
Vietnamese Entities Targeted by China-Linked Mustang Panda in Cyber Espionage
2024-06-10MandiantMandiant
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Lumma Stealer MetaStealer Raccoon RedLine Stealer RisePro Vidar UNC5537
2024-06-10The Hacker NewsRavie Lakshmanan
More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack
More_eggs
2024-06-10ZscalerManisha Ramcharan Prajapati, Muhammed Irfan V A
Technical Analysis of the Latest Variant of ValleyRAT
ValleyRAT
2024-06-09XLabAcey9, Alex.Turing
New Threat: A Deep Dive Into the Zergeca Botnet
Zergeca
2024-06-07The RecordDaryna Antoniuk
Russia-linked Vermin hackers target Ukrainian military in new espionage campaign
UAC-0020
2024-06-07SOCRadarSOCRadar
Grandoreiro Malware Campaign: A Global Threat to Banking Security
Grandoreiro
2024-06-07Security AffairsPierluigi Paganini
Pandabuy was extorted twice by the same Threat Actor
IntelBroker
2024-06-06MorphisecArnold Osipov
Howling at the Inbox: Sticky Werewolf’s Latest Malicious Aviation Attacks
Angry Likho
2024-06-06BlackberryDmitry Melikov
Kimsuky is targeting an arms manufacturer in Europe.
2024-06-06Bleeping ComputerSergiu Gatlan
New Gitloker attacks wipe GitHub repos in extortion scheme
Gitloker
2024-06-06Hunt.ioHunt.io
Tracking LightSpy: Certificates as Windows into Adversary Behavior
lightSpy
2024-06-06CrowdStrikeAlexandru Dinu, Dragoș Corlătescu, Mihaela Găman, Paul Sumedrea
EMBERSim: A Large-Scale Databank for Boosting Similarity Search in Malware Analysis
2024-06-06Medium b.magnezi0xMrMagnezi
Agent Tesla Analysis
Agent Tesla
2024-06-06ANY.RUNANY.RUN
Example Run on ANY.RUN for GaboonGrabber
GaboonGrabber
2024-06-06Medium b.magnezi0xMrMagnezi
Remcos RAT Analysis
Remcos