Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-06-13Medium BI.ZONEOleg Skulkin
Core Werewolf targets the defense industry and critical infrastructure
Awaken Likho
2023-06-13Outpost24Beatriz Pimenta Klein
ICS attack classifications: differentiating between cyberwarfare, cyberterrorism, and hacktivism
UAC-0118
2023-06-12SophosKarl Ackerman
Deep dive into the Pikabot cyber threat
Pikabot
2023-06-12Kaspersky LabsSergey Lozhkin
Sneaky DoubleFinger loads GreetingGhoul targeting your cryptocurrency
DoubleFinger GreetingGhoul
2023-06-12NTT SecurityRintaro Koike
About PowerHarbor, a new malware used by SteelClover
PowerHarbor
2023-06-09cocomelonccocomelonc
Malware development trick - part 33. Syscalls - part 2. Simple C++ example.
2023-06-09ConnectWiseConnectWise CRU
SmashJacker (ChromeLoader variant)
Choziosi
2023-06-08VMRayPatrick Staubmann
Busy Bees - The Transformation of BumbleBee
BumbleBee Cobalt Strike Conti Meterpreter Sliver
2023-06-08Check Point ResearchCheckpoint Research
Stealth Soldier Backdoor Used in Targeted Espionage Attacks in North Africa
Stealth Soldier
2023-06-07darksys0xdarksys0x
Analysis and Reversing of srvnet2.sys
LIONTAIL
2023-06-07cocomelonccocomelonc
Malware development trick - part 32. Syscalls - part 1. Simple C++ example.
2023-06-06Trend MicroDon Ovid Ladores, Earle Maui Earnshaw, Katherine Casona, Nathaniel Morales
Xollam, the Latest Face of TargetCompany
TargetCompany
2023-06-06Apophis133Michelle Khalil
RedLine Technical Analysis Report
RedLine Stealer
2023-06-06Security IntelligenceAgnes Ramos-Beauchamp, Claire Zaboeva, Joshua Chung, Melissa Frydrych
ITG10 Likely Targeting South Korean Entities of Interest to the Democratic People’s Republic of Korea (DPRK)
RokRAT
2023-06-06Sentinel LABSAleksandar Milenkoski
Kimsuky Strikes Again: New Social Engineering Campaign Aims to Steal Credentials and Gather Strategic Intelligence
2023-06-05SekoiaMaxime A
Iran Cyber Threat Overview
Cotton Sandstorm
2023-06-05Malware Traffic AnalysisBrad Duncan
30 DAYS OF FORMBOOK: DAY 1, MONDAY 2023-06-05
Formbook
2023-06-05Kaspersky LabsHaim Zigel, Oleg Kupreev
Satacom delivers browser extension that steals cryptocurrency
Satacom
2023-06-04Github (cocomelonc)cocomelonc
Malware development trick - part 31: Run shellcode via SetTimer. Simple C++ example.
2023-06-03ZscalerMallikarjun Piddannavar
Technical Analysis of Bandit Stealer
Bandit Stealer