Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-05-09Trend MicroIeriz Nicolle Gonzalez, Ivan Nicole Chavez, Katherine Casona, Nathaniel Morales
Examining the Black Basta Ransomware’s Infection Routine
Black Basta
2022-05-06CrowdStrikePaul-Danut Urian
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis
Lador
2022-05-06CrowdStrikePaul-Danut Urian
macOS Malware Is More Reality Than Myth: Popular Threats and Challenges in Analysis
EvilQuest FlashBack Shlayer XCSSET
2022-04-26Trend MicroLord Alfred Remorin, Ryan Flores, Stephen Hilt
How Cybercriminals Abuse Cloud Tunneling Services
AsyncRAT Cobalt Strike DarkComet Meterpreter Nanocore RAT
2022-04-25MorphisecMorphisec Labs
New Core Impact Backdoor Delivered Via VMware Vulnerability
Cobalt Strike JSSLoader
2022-04-25Medium proferosec-osmBrenton Morris
Static unpacker and decoder for Hello Kitty Packer
HelloKitty
2022-04-21eSentireeSentire Threat Response Unit (TRU)
Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire
More_eggs TerraLoader VenomLNK
2022-04-14Bleeping ComputerBill Toulas
New ZingoStealer infostealer drops more malware, cryptominers
2022-04-05MorphisecMichael Dereviashkin
New Analysis: The CaddyWiper Malware Attacking Ukraine
CaddyWiper
2022-03-30MorphisecHido Cohen
New Wave Of Remcos RAT Phishing Campaign
Remcos
2022-03-29AquasecAssaf Morag
Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks
2022-03-29MorphisecArnold Osipov
Exclusive Threat Research: Mars (Stealer) Attacks!
Mars Stealer
2022-03-23MorphisecHido Cohen
New JSSLoader Trojan Delivered Through XLL Files
JSSLoader
2022-03-22Avast DecodedIgor Morgenstern, Jan Holman, Luigino Camastra
Operation Dragon Castling: APT group targeting betting companies
FormerFirstRAT MulCom TianWu
2022-03-06QualysGhanshyam More
AvosLocker Ransomware Behavior Examined on Windows & Linux
Avoslocker AvosLocker
2022-03-05University of ZaragozaMiguel Martín Pérez
Effectiveness of Similarity Digest Algorithms for Binary Code Similarity in Memory Forensic Analysis
2022-02-16Medium s2wlabS2W TALON
Post Mortem of KlaySwap Incident through BGP Hijacking | EN
2022-02-14MorphisecArnold Osipov, Hido Cohen
Journey of a Crypto Scammer - NFT-001
AsyncRAT BitRAT Remcos
2022-02-09FlashpointFlashpoint
Russia Seizes Ferum, Sky-Fraud, UAS, and Trump’s Dumps—and Signals More Takedowns to Come
2022-02-02QualysGhanshyam More
Catching the RAT called Agent Tesla
Agent Tesla