Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-03-13Trend MicroAliakbar Zahravi, Peter Girnus, Simon Zuckerbraun
CVE-2024-21412: DarkGate Operators Exploit Microsoft Windows SmartScreen Bypass in Zero-Day Campaign
DarkGate
2024-03-12cybleCyble
Xehook Stealer: Evolution of Cinoshi’s Project Targeting Over 100 Cryptocurrencies and 2FA Extensions (paywall)
XehookStealer
2024-03-12AlyacYALYX4
North Kimsuky organization's policy advisor camouflaged spear phishing beware
2024-03-12FortinetYurren Wan
VCURMS: A Simple and Functional Weapon
STRRAT
2024-03-12ShadowStackREShadowStackRE
Donex ransomware
Donex
2024-03-11CyberIntAdi Bleih
GuLoader Downloaded: A Look at the Latest Iteration
CloudEyE
2024-03-11Dr.WebDr.Web
Study of a targeted attack on a Russian enterprise in the mechanical-engineering sector
WhiteSnake Stealer
2024-03-11YouTube (Embee Research)Embee_research
Xworm Script Analysis and Deobfuscation
XWorm
2024-03-10KrakzPierre Le Bourhis
SysWhispers2 analysis
Pikabot
2024-03-09Idan Malihi
Revealing the Abyss Ransomware
Abyss Locker
2024-03-09AsobancariaCSIRT Financiero
New Backdoor Activity Socks5Systemz
Socks5 Systemz
2024-03-09somedieyoungZZ
Kimsuky 2
Unidentified PS 004 (RAT)
2024-03-08Nofix.reNofix
KrustyLoader - Leveraging rust compilation artifacts to obtain reliable compilation timestamps and pivoting
KrustyLoader
2024-03-07ESET ResearchAnh ho, Facundo Muñoz
Evasive Panda leverages Monlam Festival to target Tibetans
MgBot Nightdoor
2024-03-07Twitter (@H4ckManac)HackManac
Duvel reportedly compromised by Stormous ransomware group
Stormous
2024-03-07Malware Traffic AnalysisBrad Duncan
2024-03-07 (THURSDAY): LATRODECTUS INFECTION LEADS TO LUMMA STEALER
Latrodectus Lumma Stealer
2024-03-06ProofpointDusty Miller, Jake G, Selena Larson
TA4903: Actor Spoofs U.S. Government, Small Businesses in Phishing, BEC Bids
TA4903
2024-03-06BushidoTokenBushidoToken
Tracking Adversaries: UAC-0050, Cracking The DaVinci Code
2024-03-05KrollDave Truman, George Glass, Keith Wojcieszek
TODDLERSHARK: ScreenConnect Vulnerability Exploited to Deploy BABYSHARK Variant
BabyShark
2024-03-05Team CymruS2 Research Team
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs?
Coper