Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-21DCSOJiro Minier, Johann Aydinbas, Kritika Roy, Olivia Hayward
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer
Konni
2024-02-21YouTube (Invoke RE)Josh Reynolds
Analyzing Qakbot Using Binary Ninja Automation Part 3
QakBot
2024-02-20ANY.RUNJack Zalesskiy
Understanding Macros in Malware: Types, Capabilities, Case Study
2024-02-20TrendmicroPierre Lee, Sunny Lu
Earth Preta Campaign Uses DOPLUGS to Target Asia
DOPLUGS
2024-02-20YouTube (Embee Research)Embee_research
StealC Loader Analysis - Decoding Powershell Malware With CyberChef
Stealc
2024-02-20Washington PostLeo Sands
‘World’s most harmful’ cybercriminal group disrupted in 11-nation operation
LockBit LockBit LockBit
2024-02-20EuropolEuropol
Law enforcement disrupt world’s biggest ransomware operation
LockBit LockBit LockBit
2024-02-20National Crime AgencyNational Crime Agency (NCA)
International investigation disrupts the world’s most harmful cyber crime group
LockBit LockBit LockBit
2024-02-19AhnLabAhnLab SEcurity intelligence Center
Analysis of Nood RAT Used in Attacks Against Linux (Gh0st RAT’s Variant)
Nood RAT
2024-02-19Lab52Lab52
Pelmeni Wrapper: New Wrapper of Kazuar (Turla Backdoor)
Pelmeni
2024-02-19FortinetAxelle Apvrille
Android/SpyNote bypasses Restricted Settings + breaks many RE tools
SpyNote
2024-02-19ThreatFabricThreatFabric
Anatsa Trojan Returns: Targeting Europe and Expanding Its Reach
Anatsa
2024-02-19Bundesamt für VerfassungsschutzBundesamt für Verfassungsschutz
Warning of North Korean cyber threats targeting the Defense Sector
PEBBLEDASH
2024-02-19Cyber GeeksCyberMasterV
A Technical Analysis of the BackMyData Ransomware Used to Attack Hospitals in Romania
Phobos
2024-02-17Recorded FutureInsikt Group
Russia-Aligned TAG-70 Targets European Government and Military Mail Servers in New Espionage Campaign
Unidentified JS 006 (Winter Wyvern)
2024-02-16Medium b.magnezi0xMrMagnezi
Malware Analysis — AgentTesla
Agent Tesla
2024-02-16YouTube (CactusCon)Danny Quist
Reverse Engineering Go Malware: A BianLian Story
BianLian BianLian
2024-02-16Malcatmalcat team
Writing a Qakbot 5.0 config extractor with Malcat
QakBot
2024-02-15FortinetAxelle Apvrille
Android/SpyNote Moves to Crypto Currencies
SpyNote
2024-02-15DNSCDirectoratul National de Securitate Cibernetica
Backmydata Ransomware
Phobos