Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-28FortiGuard LabsCara Lin
GoTitan Botnet - Ongoing Exploitation on Apache ActiveMQ
GoTitan
2023-11-28ANY.RUNMaksim Mikhailov
RisePro Malware Analysis: Exploring C2 Communication of a New Version
RisePro
2023-11-27SentinelOnePhil Stokes
DPRK Crypto Theft | macOS RustBucket Droppers Pivot to Deliver KandyKorn Payloads
HLOADER KANDYKORN RustBucket SUGARLOADER
2023-11-27Twitter (@embee_research)Embee_research
Building Threat Intel Queries Utilising Regex and TLS Certificates - (BianLian)
BianLian
2023-11-26Medium shaddy43Shayan Ahmed Khan
From Infection to Encryption: Tracing the Impact of RYUK Ransomware
Ryuk
2023-11-26Twitter (@embee_research)Embee_research
Identifying Suspected PrivateLoader Servers with Censys
PrivateLoader
2023-11-24Medium g0njxag0njxa
Approaching stealers devs : a brief interview with Recordbreaker
Raccoon RecordBreaker
2023-11-23Infosec WriteupsOsama Ellahi
Malware analysis Remcos RAT- 4.9.2 Pro
Remcos
2023-11-23QualysSuraj Mundalik
Unveiling the Deceptive Dance: Phobos Ransomware Masquerading As VX-Underground
Phobos
2023-11-23Check Point ResearchCheck Point Research
Israel-Hamas War Spotlight: Shaking the Rust Off SysJoker
SysJoker
2023-11-23cocomelonccocomelonc
Malware and cryptography 22: encrypt/decrypt payload via XTEA. Simple C++ example.
2023-11-23Trend MicroAliakbar Zahravi, Peter Girnus
ParaSiteSnatcher: How Malicious Chrome Extensions Target Brazil
ParaSiteSnatcher
2023-11-22Twitter (@embee_research)Embee_research
Practical Queries for Malware Infrastructure - Part 3 (Advanced Examples)
BianLian Xtreme RAT NjRAT QakBot RedLine Stealer Remcos
2023-11-22MicrosoftMicrosoft Threat Intelligence
Diamond Sleet supply chain compromise distributes a modified CyberLink installer
LambLoad
2023-11-21CheckpointMarc Salinas Fernandez
The Platform Matters: A Comparative Study on Linux and Windows Ransomware Attacks
Gwisin
2023-11-21CensysAidan Holland
Tracking Vidar Infrastructure with Censys
Vidar
2023-11-21ReliaquestJames Xiang
Scattered Spider Attack Analysis
2023-11-21IBMCharlotte Hammond, Kat Metrick, Ole Villadsen
Stealthy WailingCrab Malware misuses MQTT Messaging Protocol
Gozi WikiLoader
2023-11-21TrellixCiana Driscoll, Ernesto Fernández Provecho, Pham Duy Phuc, Vinoo Thomas
The Continued Evolution of the DarkGate Malware-as-a-Service
DarkGate
2023-11-21Palo Alto Networks Unit 42Unit 42
Hacking Employers and Seeking Employment: Two Job-Related Campaigns Bear Hallmarks of North Korean Threat Actors
BeaverTail InvisibleFerret WageMole