Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-02StairwellThreat Research at Stairwell
Proactive response: AnyDesk, any breach
Agent Tesla
2024-02-02Cyber Kendraadmin
FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits
FritzFrog
2024-02-01Infinitum ITKerime Gencay
DcRat Technical Analysis Report (Paywall)
DCRat
2024-02-01ESET ResearchESET Research
ESET takes part in global operation to disrupt the Grandoreiro banking trojan
Grandoreiro
2024-02-01SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Analysis and Detection of STEADY#URSA Attack Campaign Targeting Ukraine Military Dropping New Covert SUBTLE-PAWS PowerShell Backdoor
SUBTLE-PAWS
2024-01-31StairwellAlex Hegyi, Chris St. Myers, Evelyne Diaz Araque, Matt Richard, Silas Cutler, Vincent Zell
Technical analysis: The silent torrent of VileRAT
VileRAT EVILNUM
2024-01-30ASECSanseo
Trigona Ransomware Threat Actor Uses Mimic Ransomware
Trigona
2024-01-30ANY.RUNLena (LambdaMamba)
CrackedCantil: A Malware Symphony Breakdown - PrivateLoader, Smoke, Lumma, RedLine, RisePro, Amadey, Stealc, Socks5Systemz, STOP
Amadey CrackedCantil Lumma Stealer PrivateLoader RedLine Stealer RisePro SmokeLoader Socks5 Systemz Stealc STOP
2024-01-30Bleeping ComputerBill Toulas
Police disrupt Grandoreiro banking malware operation, make arrests
Grandoreiro
2024-01-30AT&T CybersecurityPeter Boyle
DarkGate malware delivered via Microsoft Teams - detection and response
DarkGate
2024-01-30DCSODCSO CyTec
Reporting on Volt Typhoon’s “JDY” Botnet Administration Via Tor Sparks Questions
2024-01-29hacked.codesJosh Terrill
Technical analysis of WinRAR zero-day malware and C2 protocol emulation
2024-01-29AquasecAsaf Eitani, Nitzan Yaakov
HeadCrab 2.0: Evolving Threat in Redis Malware Landscape
HeadCrab
2024-01-29HarfangLabHarfangLab CTR
Compromised Routers Are Still Leveraged as Malicious Infrastructure to Target Government Organizations in Europe and the Caucasus
MASEPIE OCEANMAP
2024-01-26SOCRadarSOCRadar
Russian APT Operation: Star Blizzard
2024-01-25JSAC 2024Facundo Muñoz
NSPX30: A sophisticated AitM-enabled implant evolving since 2005
NSPX30 ProjectWood
2024-01-25ESET ResearchFacundo Muñoz
NSPX30: A sophisticated AitM-enabled implant evolving since 2005
NSPX30 ProjectWood Blackwood
2024-01-25JSAC 2024Hara Hiroaki, Kawakami Ryonosuke, Shota Nakajima
The Secret Life of RATs: connecting the dots by dissecting multiple backdoors
DracuLoader GroundPeony HemiGate PlugX
2024-01-25JSAC 2024Masafumi Takeda, Tomoya Furukawa
Threat Intelligence of Abused Public Post-Exploitation Frameworks
AsyncRAT DCRat Empire Downloader GRUNT Havoc Koadic Merlin PoshC2 Quasar RAT Sliver
2024-01-25JSAC 2024Dongwook Kim, Seulgi Lee
Lazarus Group’s Large-scale Threats via Watering Hole and Financial Software