Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-10-11zimperiumAazim Yaswant
Expanding the Investigation: Deep Dive into Latest TrickMo Samples
TrickMo
2024-10-11Trend MicroAhmed Kamal, Bahaa Yamany, Mohamed Fahmy, Nick Dai
Earth Simnavaz (aka APT34) Levies Advanced Cyberattacks Against UAE and Gulf Regions
STEALHOOK
2024-10-10ZscalerMuhammed Irfan V A
Technical Analysis of DarkVision RAT
DarkVision RAT
2024-10-10Security BoulevardJeffrey Burt
Internet Archive is Attacked and 31 Million Files Stolen
Blackmeta
2024-10-10SOCRadarSOCRadar
Internet Archive Data Breach and DDoS Attacks: What You Need to Know
Blackmeta
2024-10-10DomainToolsSteve Behm
Uncovering Domains Created by Octo2’s Domain Generation Algorithm
Coper
2024-10-10Hunt.ioHunt.io
Unmasking Adversary Infrastructure: How Certificates and Redirects Exposed Earth Baxia and PlugX Activity
PlugX
2024-10-09Recorded FutureInsikt Group
Outmaneuvering Rhysida: How Advanced Threat Intelligence Shields Critical Infrastructure from Ransomware
Broomstick Rhysida
2024-10-09Palo AltoUnit 42
Contagious Interview: DPRK Threat Actors Lure Tech Industry Job Seekers to Install New Variants of BeaverTail and InvisibleFerret Malware
beavertail Beavertail
2024-10-08TrustwaveCris Tomboc, King Orande
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader
Pronsis Loader Latrodectus Lumma Stealer
2024-10-08Hunt.ioHunt.io
Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Pages
SpyNote
2024-10-07Kaspersky LabsKaspersky
Awaken Likho is awake: new techniques of an APT group
Awaken Likho
2024-10-06GoogleClement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-10-05Mandar Naik
Malware Analysis - Lumma Stealer
Lumma Stealer
2024-10-04nikhilh-20Nikhil Hegde
Emansrepo Infostealer - PyInstaller, Deobfuscation and LLM
emansrepo
2024-10-04Cyfirmacyfirma
VILSA STEALER
Vilsa Stealer
2024-10-03SecuronixDen Iyzvyk, Tim Peck
SHROUDED#SLEEP: A Deep Dive into North Korea’s Ongoing Campaign Against Southeast Asia
2024-10-03GitHub (dstepanic)Daniel Stepanic
Getting Cozy with Milk and WARMCOOKIES
WarmCookie
2024-10-03AquaAssaf Morag, Idan Revivo
perfctl: A Stealthy Malware Targeting Millions of Linux Servers
perfctl
2024-10-02ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Amnesia Stealer Technical Malware Analysis Report
BlankGrabber