Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-17ANY.RUNANY.RUN
Deobfuscating the Latest GuLoader: Automating Analysis with Ghidra Scripting
CloudEyE
2023-05-17Group-IBJoshua Penny, Nikita Rostovtsev, Yashraj Solanki
The distinctive rattle of APT SideWinder
SideWinder
2023-05-16Trend MicroSunil Bharti
8220 Gang Evolves With New Strategies
Water Sigbin
2023-05-16SecureworksCounter Threat Unit ResearchTeam
The Growing Threat from Infostealers
Graphiron GraphSteel Raccoon RedLine Stealer Rhadamanthys Taurus Stealer Vidar
2023-05-16CyberRaijuJai Minton
Remcos RAT - Malware Analysis Lab
Remcos
2023-05-15Trend MicroJaromír Hořejší, Joseph C Chen
Water Orthrus's New Campaigns Deliver Rootkit and Phishing Modules
CopperStealth CopperStealer Water Orthrus
2023-05-15CrowdStrikeCrowdStrike
Hypervisor Jackpotting, Part 3: Lack of Antivirus Support Opens the Door to Adversary Attacks
BlackCat SystemBC
2023-05-15SymantecThreat Hunter Team
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors
Merdoor PlugX ShadowPad ZXShell Lancefly
2023-05-15embeeresearchEmbee_research
Quasar Rat Analysis - Identification of 64 Quasar Servers Using Shodan and Censys
Quasar RAT
2023-05-13SekoiaJeremy Scion, Livia Tibirna, Pierre Le Bourhis, Sekoia TDR
Mallox affiliate leverages PureCrypter in MS-SQL exploitation campaigns
PureCrypter TargetCompany
2023-05-13Xitan LaboratoryABC123
Article 62: Summary of Vietnam Hailianhua APT’s Email Phishing Techniques and Tactics against Mainland China
2023-05-12YouTube (BSides Prishtina)Egxona Ferati, META
Automating Threat Detection and Response at Scale - Egxona Ferati
2023-05-12Cyfirmacyfirma
Evolution of KILLNET from Hacktivism to Private Hackers Company and the Role of Sub-groups
Zarya
2023-05-12SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Ongoing MEME#4CHAN Attack/Phishing Campaign uses Meme-Filled Code to Drop XWorm Payloads
XWorm
2023-05-10BitdefenderAlexandru Maximciuc, Gheorghe Adrian Schipor, Martin Zugec, Victor Vrabie
Deep Dive Into DownEx Espionage Operation in Central Asia
DownEx
2023-05-10MalwarebytesHossein Jazi, Roberto Santos
Uncovering RedStinger - Undetected APT cyber operations in Eastern Europe since 2020
PowerMagic RedStinger
2023-05-10Deep instinctDeep Instinct Threat Lab
BPFDoor Malware Evolves – Stealthy Sniffing Backdoor Ups Its Game
BPFDoor
2023-05-09YouTube (Security BSides London)Google, Troy Defty
Detection At Scale
2023-05-09eSentireRussianPanda
eSentire Threat Intelligence Malware Analysis: Vidar Stealer
Vidar
2023-05-09Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
MetaStealer string decryption and DGA overview
MetaStealer