Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-08-02Medium (@morimolymoly)morimolymoly
HUI Loader — Malware Analysis Note
HUI Loader
2023-07-31Medium (csg-govtech)Greg Jefferson
China-Backed Hackers Threaten Texas Military Sites, Utilities
2023-07-29Medium walmartglobaltechJason Reaves, Joshua Platt
Unknown powershell backdoor with ties to new Zloader
Zloader
2023-07-23Medium infoSec Write-upsmov_eax_27
Unpacking an Emotet Trojan
Emotet
2023-07-18Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
NemesisProject
Nemesis
2023-07-07Medium cryptaxAxelle Apvrille
Eyes on Android/S.O.V.A botnet sample
S.O.V.A.
2023-06-23MediumTaisiia Garkava
ObserverStealer: Unmasking the New Contender in Cyber Crime
ObserverStealer
2023-06-23Medium (Cryptax)Axelle Apvrille
Inside KangaPack: the Kangaroo packer with native decryption
FluHorse
2023-06-13Medium BI.ZONEOleg Skulkin
Core Werewolf targets the defense industry and critical infrastructure
Awaken Likho
2023-05-17Medium (@DCSO_CyTec)Axel Wauer, Emilia Neuber, Jiro Minier, Johann Aydinbas, Kritika Roy
Andariel’s “Jupiter” malware and the case of the curious C2
Jupiter
2023-05-14MediumDenshi Yūrei
Silent Echoes: The Hidden Dialogue among Malware Entities — Spotlight on AMOS InfoStealer
AMOS Aurora Stealer TitanStealer
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-04-19Medium (@simone.kraus)Simone Kraus
Rorschach Ransomware Analysis with Attack Flow
Rorschach Ransomware
2023-04-17Medium (@lcam)Luca Mella
Data Insights from Russian Cyber Militants: NoName05716
Dosia
2023-04-13Medium Invictus Incident ResponseInvictus Incident Response
Ransomware in the cloud
2023-04-05Medium IlanduIlan Duhin
PortDoor - APT Backdoor analysis
ACBackdoor 8.t Dropper PortDoor
2023-03-23Medium s2wlabBLKSMTH, S2W TALON
Scarcruft Bolsters Arsenal for targeting individual Android devices
RambleOn RokRAT
2023-03-20Medium s2wlabHOTSAUCE, S2W TALON
Detailed Analysis of Cryptocurrency Phishing Through Famous YouTube Channel Hacking
2023-03-17Medium s2wlabBLKSMTH, S2W TALON
Kimsuky group appears to be exploiting OneNote like the cybercrime group
2023-03-10Medium walmartglobaltechJason Reaves, Joshua Platt
From Royal With Love
Cobalt Strike Conti PLAY Royal Ransom Somnia