Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-03Check Point ResearchCheck Point Research
Inside Akira Ransomware’s Rust Experiment
Akira
2024-12-03BitSightBitsight TRACE
PROXY.AM Powered by Socks5Systemz Botnet
Socks5 Systemz
2024-12-02The DFIR ReportThe DFIR Report
The Curious Case of an Egg-Cellent Resume
More_eggs Pyramid Cobalt Strike
2024-12-02Red CanaryRed Canary Intelligence
Storm-1811 exploits RMM tools to drop Black Basta ransomware
UNC4393
2024-12-02TechSpotAlfonso Maruccia
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale
Massgrave
2024-12-02Kaspersky LabsArtem Ushkov
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT
NetSupportManager RAT RMS
2024-12-02FortiGuard LabsPei Han Liao
SmokeLoader Attack Targets Companies in Taiwan
SmokeLoader
2024-12-02Medium b.magnezi0xMrMagnezi
LokiBot Malware Analysis
Loki Password Stealer (PWS)
2024-12-02ZscalerMuhammed Irfan V A
Unveiling RevC2 and Venom Loader
RevC2 VenomLoader
2024-12-01NorthwaveAlex Oudenaarden, Michaël Schrijver
LITTLELAMB.WOOLTEA: Stealthy Network Edge Device Backdoor
2024-11-30cocomelonccocomelonc
Malware and cryptography 35: encrypt payload via Treyfer algorithm. Simple C example.
2024-11-30Technical Evolutiontechevo
REKOOBE APT-31 Linux Backdoor Analysis
Rekoobe
2024-11-29FortinetFred Gutierrez, Shunichi Imano
Ransomware Roundup - Interlock
Interlock Interlock Supper
2024-11-28PTSecurityVladislav Lunin
TaxOff: um, you've got a backdoor...
Team46
2024-11-28Hunt.ioHunt.io
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
XWorm
2024-11-28StrikeReadyStrikeReady Labs
RU APT targeting Energy Infrastructure (Unknown unknowns, part 3)
Edam Emmenhtal
2024-11-27Rapid7Natalie Zargarov
New “CleverSoar” Installer Targets Chinese and Vietnamese Users
ValleyRAT
2024-11-27ESET ResearchMartin Smolár, Peter Strýček
Bootkitty: Analyzing the first UEFI bootkit for Linux
Bootkitty
2024-11-26ArxivAlessio Di Santo
Lazarus Group Targets Crypto-Wallets and Financial Data while employing new Tradecrafts
BeaverTail InvisibleFerret tsunami TsunamiKit
2024-11-26Reco AIGal Nakash
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage
ElizaRAT Operation C-Major