Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-04-21eSentireeSentire Threat Response Unit (TRU)
Hackers Spearphish Corporate Hiring Managers with Poisoned Resumes, Infecting Them with the More_Eggs Malware, Warns eSentire
More_eggs TerraLoader VenomLNK
2022-04-14Bleeping ComputerBill Toulas
New ZingoStealer infostealer drops more malware, cryptominers
2022-04-05MorphisecMichael Dereviashkin
New Analysis: The CaddyWiper Malware Attacking Ukraine
CaddyWiper
2022-03-30MorphisecHido Cohen
New Wave Of Remcos RAT Phishing Campaign
Remcos
2022-03-29AquasecAssaf Morag
Threat Alert: First Python Ransomware Attack Targeting Jupyter Notebooks
2022-03-29MorphisecArnold Osipov
Exclusive Threat Research: Mars (Stealer) Attacks!
Mars Stealer
2022-03-23MorphisecHido Cohen
New JSSLoader Trojan Delivered Through XLL Files
JSSLoader
2022-03-22Avast DecodedIgor Morgenstern, Jan Holman, Luigino Camastra
Operation Dragon Castling: APT group targeting betting companies
FormerFirstRAT MulCom TianWu
2022-03-06QualysGhanshyam More
AvosLocker Ransomware Behavior Examined on Windows & Linux
Avoslocker AvosLocker
2022-03-05University of ZaragozaMiguel Martín Pérez
Effectiveness of Similarity Digest Algorithms for Binary Code Similarity in Memory Forensic Analysis
2022-02-16Medium s2wlabS2W TALON
Post Mortem of KlaySwap Incident through BGP Hijacking | EN
2022-02-14MorphisecArnold Osipov, Hido Cohen
Journey of a Crypto Scammer - NFT-001
AsyncRAT BitRAT Remcos
2022-02-09FlashpointFlashpoint
Russia Seizes Ferum, Sky-Fraud, UAS, and Trump’s Dumps—and Signals More Takedowns to Come
2022-02-02QualysGhanshyam More
Catching the RAT called Agent Tesla
Agent Tesla
2022-02-01ThreatFabric
Xenomorph: A newly hatched Banking Trojan
Xenomorph
2022-01-31IBMItzik Chimino, Limor Kessem
Top-Ranking Banking Trojan Ramnit Out to Steal Payment Card Data
Ramnit
2022-01-28MorphisecMorphisec Labs
Log4j Exploit Hits Again: Vulnerable Unifi Network Application (Ubiquiti) at Risk
Cobalt Strike
2022-01-27CrowdStrikeMatthew Hartzell
Programs Hacking Programs: How to Extract Memory Information to Spot Linux Malware
2022-01-25MorphisecMichael Dereviashkin
New Threat Campaign Identified: AsyncRAT Introduces a New Delivery Technique
AsyncRAT
2022-01-25AvastAnh ho, Igor Morgenstern
Chasing Chaes Kill Chain
Chaes