Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-12-13CISACISA
Russian Foreign Intelligence Service (SVR) Exploiting JetBrains TeamCity CVE Globally
GraphDrop
2023-12-13StairwellSilas Cutler
Kuiper ransomware analysis: Stairwell’s technical report
2023-12-13HackReadWAQAS
Scammers Weaponize Google Forms in New BazarCall Attack
2023-12-13LumenBlack Lotus Labs
Routers Roasting on an Open Firewall: the KV-botnet Investigation
KV
2023-12-13ShadowStackREShadowStackRE
Rhysida Ransomware
Rhysida Rhysida
2023-12-12ProofpointKelsey Merriman, Selena Larson, Xavier Chambrier
Security Brief: TA4557 Targets Recruiters Directly via Email
More_eggs FIN6
2023-12-12eSentireRob Pittman
Unraveling BatLoader and FakeBat
EugenLoader
2023-12-12FourcoreSwapnil
Rhysida Ransomware: History, TTPs And Adversary Emulation Plans
Rhysida Rhysida Vanilla Tempest
2023-12-12Youtube (OALabs)Sergei Frankoff
Tips For Analyzing Delphi Binaries in IDA (Danabot)
DanaBot
2023-12-12Ukrainska PravdaAlona Mazurenko
Ukrainian intelligence attacks and paralyses Russia's tax system
2023-12-12MicrosoftMicrosoft Threat Intelligence
Threat actors misuse OAuth applications to automate financially driven attacks
Storm-1283 Storm-1286
2023-12-12Check Point ResearchCheck Point
November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus
FAKEUPDATES AsyncRAT
2023-12-11Lab523722304989, varit0
Mustang Panda’s PlugX new variant targetting Taiwanese government and diplomats
DOPLUGS
2023-12-11Cisco TalosAsheer Malhotra, Jungsoo An, Vitor Ventura
Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang
BottomLoader DLRAT HazyLoad NineRAT
2023-12-11Sentinel LABSAleksandar Milenkoski, Bendik Hagen
Sandman APT | China-Based Adversaries Embrace Lua
KEYPLUG LuaDream
2023-12-11Washington PostEllen Nakashima, Joseph Menn
China’s cyber army is invading critical U.S. services
2023-12-10Detect FYISimone Kraus
Rhysida Ransomware and the Detection Opportunities
PolyVice Rhysida Vanilla Tempest
2023-12-10cocomelonccocomelonc
Malware development: persistence - part 23. LNK files. Simple Powershell example.
Emotet
2023-12-09Github (struppigel)Karsten Hahn
AST based GootLoader unpacker, C2 extractor and deobfuscator
GootLoader
2023-12-08Twitter (@embee_research)Embee_research
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction
Cobalt Strike