Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-10ESET ResearchLukáš Štefanko
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
XploitSPY
2024-04-10ProofpointSelena Larson, Tommy Madjar
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
Rhadamanthys
2024-04-09sysdigSysdig Threat Research Team
RUBYCARP: A Detailed Analysis of a Sophisticated Decade-Old Botnet Group
PerlBot RUBYCARP
2024-04-09Cisco TalosCisco Talos
Starry Addax targets human rights defenders in North Africa with new malware
Starry Addax
2024-04-09Israel National Cyber DirectorateIsrael National Cyber Directorate
קבוצת התקיפה האיראנית Black Shadow
2024-04-09eSentireeSentire
Unraveling Not AZORult but Koi Loader: A Precursor to Koi Stealer
Koi Loader Koi Stealer
2024-04-09Hunt.ioHunt.io
BlueShell: Four Years On, Still A Formidable Threat
BlueShell
2024-04-09ClarotyTeam82
Unpacking the Blackjack Group's Fuxnet Malware
BlackJack
2024-04-09Immersive LabsImmersive Labs
Havoc C2 Framework – A Defensive Operator’s Guide
Havoc
2024-04-09DCSODCSO CyTec
XZ Backdoor: How to check if your systems are affected
xzbot
2024-04-09kienmanowar Blogm4n0w4r, Tran Trung Kien
[QuickNote] Phishing email distributes WarZone RAT via DBatLoader
Ave Maria DBatLoader
2024-04-08GBHackers on SecurityDivya
Vedalia APT Group Exploits Oversized LNK Files to Deliver Malware
Opal Sleet
2024-04-080x0d4y0x0d4y
IcedID – Technical Analysis of an IcedID Lightweight x64 DLL
IcedID
2024-04-08ZscalerNikolaos Pantazopoulos
Automating Pikabot’s String Deobfuscation
Pikabot
2024-04-07HackReadWAQAS
Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data (UPDATED)
USDoD
2024-04-07cyber5wM4lcode
Gafgyt Backdoor Analysis
Bashlite
2024-04-05Heimdal SecurityMadalina Popovici
Powerhost’s ESXi Servers Encrypted with New SEXi Ransomware
SEXi SEXi
2024-04-05DARKReadingTara Seals
Ransomware Desires VMware Hypervisors in Ongoing Campaign
SEXi SEXi
2024-04-04MandiantAshley Pearson, Austin Larsen, Billy Wong, John Wolfram, Joseph Pisano, Josh Murchie, Lukasz Lamparski, Matt Lin, Ron Craft, Ryan Hall, Shawn Chew, Tyler McLellan
Cutting Edge, Part 4: Ivanti Connect Secure VPN Post-Exploitation Lateral Movement Case Studies
UNC3569 UNC5266 UNC5291 UNC5330 UNC5337 UTA0178
2024-04-04Cisco TalosChetan Raghuprasad, Joey Chen
CoralRaider targets victims’ data and social media accounts
CoralRaider