Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-06-12NTT SecurityRintaro Koike
About PowerHarbor, a new malware used by SteelClover
PowerHarbor
2023-06-09cocomelonccocomelonc
Malware development trick - part 33. Syscalls - part 2. Simple C++ example.
2023-06-09ConnectWiseConnectWise CRU
SmashJacker (ChromeLoader variant)
Choziosi
2023-06-08VMRayPatrick Staubmann
Busy Bees - The Transformation of BumbleBee
BumbleBee Cobalt Strike Conti Meterpreter Sliver
2023-06-08Check Point ResearchCheckpoint Research
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa
Stealth Soldier
2023-06-07darksys0xdarksys0x
Analysis and Reversing of srvnet2.sys
LIONTAIL
2023-06-07cocomelonccocomelonc
Malware development trick - part 32. Syscalls - part 1. Simple C++ example.
2023-06-06Trend MicroDon Ovid Ladores, Earle Maui Earnshaw, Katherine Casona, Nathaniel Morales
Xollam, the Latest Face of TargetCompany
TargetCompany
2023-06-06Apophis133Michelle Khalil
RedLine Technical Analysis Report
RedLine Stealer
2023-06-06Security IntelligenceAgnes Ramos-Beauchamp, Claire Zaboeva, Joshua Chung, Melissa Frydrych
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)
RokRAT
2023-06-06Sentinel LABSAleksandar Milenkoski
Kimsuky Strikes Again: New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence
2023-06-05SekoiaMaxime A
Iran Cyber Threat Overview
Cotton Sandstorm
2023-06-05Malware Traffic AnalysisBrad Duncan
30 DAYS OF FORMBOOK: DAY 1, MONDAY 2023-06-05
Formbook
2023-06-05Kaspersky LabsHaim Zigel, Oleg Kupreev
Satacom delivers browser extension that steals cryptocurrency
Satacom
2023-06-04Github (cocomelonc)cocomelonc
Malware development trick - part 31: Run shellcode via SetTimer. Simple C++ example.
2023-06-03ZscalerMallikarjun Piddannavar
Technical Analysis of Bandit Stealer
Bandit Stealer
2023-06-02MandiantDAN NUTTING, Genevieve Stark, Greg Blaum, Jeremy Kennelly, JOE PISANO, Josh Murchie, Juraj Sucik, Justin Moore, Kimberly Goody, Matthew McWhirt, Nader Zaveri, NICHOLAS BENNETT, OLLIE STYLES, PETER UKHANOV, WILL SILVERSTONE, ZACH SCHRAMM, Zander Work
Zero-Day Vulnerability in MOVEit Transfer Exploited for Data Theft
2023-06-01Infinitum ITKerime Gencay
BlackCat Ransomware Analysis Report (Paywall)
BlackCat
2023-06-01vmwareFae Carlisle
Carbon Black’s TrueBot Detection
Silence
2023-06-01K7 SecurityRahul R
Encrypted Chaos: Analysis of Crytox Ransomware
Crytox