Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-13GridinsoftGridinsoft Cyber Security
What is Lumma Stealer?
Lumma Stealer
2024-02-13ProofpointAxel F, Selena Larson
Bumblebee Buzzes Back in Black
BumbleBee
2024-02-13Trend MicroAliakbar Zahravi, Peter Girnus, Simon Zuckerbraun
Water Hydra Targets Traders with Microsoft Defender SmartScreen Zero-Day
DarkMe
2024-02-12Estrellas's BlogOtávio M.
Unveiling custom packers: A comprehensive guide
Dridex Simda
2024-02-12Palo Alto Networks Unit 42Dan Yashnik, Lior Rochberger
Diving Into Glupteba's UEFI Bootkit
Glupteba
2024-02-12VenzoV
WikiLoader "notepad" part 2 - bingmaps.dll & explorer.exe injection
WikiLoader
2024-02-12EuropolEuropol
International cybercrime malware service targeting thousands of unsuspecting consumers dismantled
Ave Maria
2024-02-12HelpNetSecurityZeljka Zorz
Decryptor for Rhysida ransomware is available!
Rhysida
2024-02-12BleepingComputerBill Toulas
FBI seizes Warzone RAT infrastructure, arrests malware vendor
Ave Maria
2024-02-12ZscalerNikolaos Pantazopoulos
The (D)Evolution of Pikabot
Pikabot
2024-02-11Microsoft Security Intelligence
Scano
Scano
2024-02-11Estrellas's BlogOtávio M.
Unpacking an Emotet trojan
Emotet
2024-02-11glyc3rius.github.ioGlyc3rius
Analysing STOP Ransomware
STOP
2024-02-09Hunt.ioMichael R
Tracking ShadowPad Infrastructure Via Non-Standard Certificates
ShadowPad
2024-02-09Department of JusticeOffice of Public Affairs
International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments
Ave Maria
2024-02-09YouTube (Invoke RE)Josh Reynolds
Analyzing and Unpacking Qakbot Using Binary Ninja Automation Part 2
QakBot
2024-02-09CensysCensys, Embee_research
A Beginners Guide to Tracking Malware Infrastructure
AsyncRAT BianLian Cobalt Strike QakBot
2024-02-09K7 SecuritySuresh Reddy
The Phoenix Rises Again
2024-02-09YouTube (Embee Research)Embee_research
Guloader Decoding With Cyberchef
CloudEyE
2024-02-08Cisco TalosCisco Talos
New Zardoor backdoor used in long-term cyber espionage operation targeting an Islamic organization
HTran reGeorg Venom Proxy ZarDoor