Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-12Cyfirmacyfirma
Evolution of KILLNET from Hacktivism to Private Hackers Company and the Role of Sub-groups
Zarya
2023-05-12SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads
XWorm
2023-05-10BitdefenderMartin Zugec
Deep Dive Into DownEx Espionage Operation in Central Asia
DownEx
2023-05-10MalwarebytesHossein Jazi, Roberto Santos
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020
PowerMagic RedStinger
2023-05-10Deep instinctDeep Instinct Threat Lab
BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game
BPFDoor
2023-05-09YouTube (Security BSides London)Google, Troy Defty
Detection At Scale
2023-05-09eSentireRussianPanda
eSentire Threat Intelligence Malware Analysis: Vidar Stealer
Vidar
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer
2023-05-09TrendmicroGilbert Sison, Khristian Joseph Morales
Managed XDR Investigation of Ducktail in Trend Micro Vision One
DUCKTAIL
2023-05-09Huntress LabsMatthew Brennan
Advanced Cyberchef Tips - AsyncRAT Loader
AsyncRAT
2023-05-09paloalto Netoworks: Unit42Anthony Galiette, Daniel Bunce, Doel Santos
Threat Assessment: Royal Ransomware
Royal Ransom Royal Ransom
2023-05-08BlackberryBlackBerry Research & Intelligence Team
SideWinder Uses Server-side Polymorphism to Attack Pakistan Government Officials — and Is Now Targeting Turkey
2023-05-08cocomelonccocomelonc
Malware analysis report: WinDealer (LuoYu Threat Group)
WinDealer
2023-05-07Twitter (@embee_research)Matthew
AgentTesla - Full Loader Analysis - Resolving API Hashes Using Conditional Breakpoints
Agent Tesla
2023-05-05cybleCyble
Sophisticated DarkWatchMan RAT Spreads Through Phishing Sites
DarkWatchman
2023-05-04SOCRadarSOCRadar
Sandworm Attackers Use WinRAR to Wipe Data from Government Devices
RoarBAT
2023-05-04SecurityScorecardVlad Pasca
How to Analyze Java Malware – A Case Study of STRRAT
STRRAT
2023-05-03METABen Nimmo, Nathaniel Gleicher
Meta’s Adversarial Threat Report, First Quarter 2023
2023-05-03Palo Alto Networks Unit 42Bob Jung, Daniel Raygoza, Mark Lim
Teasing the Secrets From Threat Actors: Malware Configuration Parsing at Scale
IcedID PhotoLoader
2023-05-02SeqriteSathwik Ram Prakki
Transparent Tribe APT actively lures Indian Army amidst increased targeting of Educational Institutions
Crimson RAT