Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-21Cert-UACert-UA
UAC-0063 Attacks Research Institutions of Ukraine: HATVIBE + CHERRYSPY + CVE-2024-23692 (CERT-UA#10356)
HATVIBE
2024-07-15Check PointCheckpoint Research
New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns
bugsleep
2024-07-15ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Kematian Stealer Technical Malware Analysis
Kematian Stealer
2024-07-14PhylumPhylum Research Team
Fake AWS Packages Ship Command and Control Malware In JPEG Files
2024-06-17splunkSplunk Threat Research Team
LNK or Swim: Analysis & Simulation of Recent LNK Phishing
2024-06-13VolexityVolexity Threat Research
DISGOMOJI Malware Used to Target Indian Government
2024-06-11ZscalerThreatLabZ research team
A Brief History of SmokeLoader, Part 1
SmokeLoader
2024-06-04QianxinRed Raindrop Team
Operation Veles: Decade-Long Espionage Targeting the Global Research and Education Sector
UTG-Q-008
2024-05-28ReliaquestRELIAQUEST THREAT RESEARCH TEAM
BlackSuit Attack Analysis
BlackSuit
2024-05-24Check Point Software Technologies LtdCheck Point Research
Bad Karma, No Justice: Void Manticore Destructive Activities in Israel
BiBi-Linux
2024-05-23Twitter (@embee_research)Embee_research
Tracking APT SideWinder With DNS Records
SideWinder
2024-05-23CheckpointCheckpoint Research
Sharp dragon expands towards africa and the caribbean
5.t Downloader Cobalt Strike
2024-05-21Twitter (@embee_research)Embee_research
Tweets on decoding a Latrodectus loader
Latrodectus
2024-05-15ESET ResearchFilip Jurčacko
To the Moon and back(doors): Lunar landing in diplomatic missions
LunarMail
2024-05-15StairwellThreat Research at Stairwell
Stairwell threat report: Black Basta overview and detection rules
Black Basta Black Basta
2024-05-15Twitter (@embee_research)Embee_research
Revealing Spammer Infrastructure With Passive DNS - 226 Toll-Themed Domains Targeting Australia
2024-05-14Check Point ResearchAntonis Terefos, Tera0017
Foxit PDF “Flawed Design” Exploitation
Rafel RAT Agent Tesla AsyncRAT DCRat DONOT Nanocore RAT NjRAT Pony Remcos Venom RAT XWorm
2024-05-14ESET ResearchMarc-Etienne M.Léveillé
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
Ebury
2024-05-13ESET ResearchMarc-Etienne M.Léveillé
Ebury is alive but unseen: 400k Linux servers compromised for cryptocurrency theft and financial gain
Ebury
2024-05-11Purple Team Security Research
Russian APT deploys new 'Kapeka' backdoor in Eastern European attacks
Kapeka