Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-09-28Ransomware.orgJohn E. Dunn
The Scattered Spider Ransomware Group’s Secret Weapons? Social Engineering and Fluent English
2023-09-28HarfangLabClaudio Teixeira
Loader Galore - TaskLoader at the start of a Pay-per-Install Infection Chain
CustomerLoader Fabookie LgoogLoader SmokeLoader
2023-09-28CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russia's Cyber Tactics H1' 2023
APT29 Sandworm Turla XakNet Zarya
2023-09-28ConfiantBOZOSLIVEHERE
Exploring ScamClub Payloads via Deobfuscation Using Abstract Syntax Trees
ScamClub
2023-09-27SecurityAffairsPierluigi Paganini
‘Ransomed.VC’ in the Spotlight – What is Known About the Ransomware Group Targeting Sony and NTT Docomo
RansomVC
2023-09-27BridewellBridewell
Uncovering the “Easy Stealer” Infostealer
Easy Stealer
2023-09-27Positive TechnologiesDenis Kuvshinov, Maxim Andreev
Dark River. You can't see them, but they're there
Dacls Unidentified 106
2023-09-27Cyber GeeksVlad Pasca
A Deep Dive into Brute Ratel C4 payloads – Part 2
Brute Ratel C4
2023-09-26ANY.RUNJane, khr0x
Analyzing Lu0Bot: A Node.js Malware with Near-Unlimited Capabilities
Lu0Bot
2023-09-25EchoCTIBilal BAKARTEPE, bixploit
Rhdamanthys Technical Analysis Report
Rhadamanthys
2023-09-25EchoCTIBilal BAKARTEPE, bixploit
StealC Technical Analysis Report
Stealc
2023-09-25Video Games ChronicleTom Ivan
A ransomware group claims to have breached ‘all Sony systems’
RansomVC
2023-09-25NSFOCUSNSFOCUS
Warning: Newly Discovered APT Attacker AtlasCross Exploits Red Cross Blood Drive Phishing for Cyberattack
AtlasAgent AtlasCross
2023-09-25SecuronixD. Iuzvyk, Oleg Kolesnikov, Tim Peck
Securonix Threat Labs Security Advisory: New STARK#VORTEX Attack Campaign: Threat Actors Use Drone Manual Lures to Deliver MerlinAgent Payloads
Merlin
2023-09-250x0v1Ovi
REArchive: Reverse engineering APT37’s GOLDBACKDOOR dropper
GOLDBACKDOOR
2023-09-25cocomelonccocomelonc
Malware development trick - part 36: Enumerate process modules. Simple C++ example.
4h_rat Aria-body
2023-09-24Virus BulletinTakuma Matsumoto, Yoshihiro Ishikawa
Let's GO Door with KCP
gokcpdoor
2023-09-23MandiantFernando Tomlinson, Nader Zaveri
Special Delivery: Defending and Investigating Advanced Intrusions on Secure Email Gateways
SALTWATER SEASPY WHIRLPOOL UNC4841
2023-09-23ZscalerNiraj Shivtarkar, Satyam Singh
BunnyLoader, the newest Malware-as-a-Service
BunnyLoader
2023-09-22Palo Alto Networks Unit 42Lior Rochberger, Robert Falcone, Tom Fakterman
Cyberespionage Attacks Against Southeast Asian Government Linked to Stately Taurus, Aka Mustang Panda
Cobalt Strike MimiKatz RemCom ShadowPad TONESHELL