Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-18MandiantMandiant Intelligence
Stealth Mode: Chinese Cyber Espionage Actors Continue to Evolve Tactics to Avoid Detection
BPFDoor SALTWATER SEASPY SideWalk ZuoRAT Daxin HyperBro HyperSSL Waterbear
2023-07-18Positive TechnologiesPTSecurity
Space Pirates: a look into the group's unconventional techniques, new attack vectors, and tools
Voidoor
2023-07-18Medium walmartglobaltechJason Reaves, Jonathan Mccay, Joshua Platt
NemesisProject
Nemesis
2023-07-17AcronisAcronis Security
8Base ransomware stays unseen for a year
8Base Phobos SmokeLoader
2023-07-17FlashpointFlashpoint
The New Release of Danabot Version 3: What You Need to Know
DanaBot
2023-07-17SecurityScorecardVlad Pasca
A technical analysis of the Quasar-forked RAT called VoidRAT
VoidRAT
2023-07-16Perception PointIgal Lytzki
Manipulated Caiman: The Sophisticated Snare of Mexico’s Banking Predators
Mispadu
2023-07-16Github (cocomelonc)cocomelonc
Malware development: persistence - part 22. Windows Setup. Simple C++ example.
2023-07-16OALabsSergei Frankoff
Lobshot: Lobshot a basic hVNC bot
LOBSHOT
2023-07-15N1ght-W0lf BlogAbdallah Elshinbary
Deep Analysis of GCleaner
GCleaner
2023-07-15MSSP Labcocomelonc
Malware source code investigation: BlackLotus - part 1
BlackLotus
2023-07-14Trend MicroDaniel Lunghi
Possible Supply-Chain Attack Targeting Pakistani Government Delivers Shadowpad
ShadowPad DriftingCloud Tonto Team
2023-07-14MicrosoftMicrosoft Threat Intelligence
Analysis of Storm-0558 techniques for unauthorized email access
Storm-0558
2023-07-14ProofpointThreat Insight
Tweets on Discovery of WikiLoader
WikiLoader
2023-07-13Aqua NautilusAssaf Morag, Ofek Itach
TeamTNT Reemerged with New Aggressive Cloud Campaign
TeamTNT
2023-07-13BrandefenseBrandefense
APT 36 Campaign – Poseidon Malware Technical Analysis
Poseidon Crimson RAT Oblique RAT
2023-07-13Rapid7 LabsNatalie Zargarov
Old Blackmoon Trojan, NEW Monetization Approach
KrBanker
2023-07-13malware.loveRobert Giczewski
TrueBot Analysis Part IV - Config Extraction
Silence
2023-07-13MSSP Labcocomelonc
Malware analysis report: BlackCat ransomware
BlackCat BlackCat
2023-07-13Trend MicroFernando Mercês
Detecting BPFDoor Backdoor Variants Abusing BPF Filters
BPFDoor Symbiote