Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-24Medium SlowMistSlowMist
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques
2025-02-23The GuardianJoanna Partridge
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’
2025-02-23Github (albertzsigovits)Albert Zsigovits
ToxicEye RAT config extraction and YARA signatures
ToxicEye
2025-02-22Youtube (greenplan)greenplan
[BINARY REFINERY] (MintsLoader) - Deobfuscation of a simple XOR to get the URL
MintsLoader
2025-02-22CrowdStrikeCrowdStrike
Curly Spider
UNC4393
2025-02-22CrowdStrikeCrowdStrike
Wandering Spider
Black Basta Black Basta GOLD REBELLION
2025-02-22CointelegraphVince Quill
Lazarus Group moves funds to multiple wallets as Bybit offers bounty
2025-02-21cyjaxCymon
How’s that for a malicious Linkc, new group launches DLS
LinkC Pub
2025-02-21Medium SarvivaMalwareAnalystsarviya
Process Hollowing — Malware Reverse Engineering.
2025-02-21SonicWallSonicWall
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered
Remcos
2025-02-21Kaspersky LabsKaspersky
Angry Likho: Old beasts in a new forest
Lumma Stealer Angry Likho
2025-02-21TRM LabsTRM Insights
TRM Links North Korea to Record $1.5 Billion Record Hack
2025-02-21Twitter (@salmanvsf)Salman Shaikh
Tweet about VXPCrypter
2025-02-20RedHotCyberPietro Melillo
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
LinkC Pub
2025-02-20Group-IBDmitrii Yankelevich, Dmitry Pisarev, Pavel Naumov
Fingerprint Heists: How your browser fingerprint can be stolen and used by fraudsters
ScreamedJungle
2025-02-20Hunt.ioHunt.io
LightSpy Expands Command List to Include Social Media Platforms
lightSpy
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor PlugX ShadowPad Teleboyi
2025-02-20Cisco TalosCisco Talos
Weathering the storm: In the midst of a Typhoon
2025-02-20Cyber TriageChris Ray
WMI Malware: The Complete Forensics Guide
ShrinkLocker
2025-02-20ReliaquestJohn Dilgen
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses
ReedBed