Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-12-12eSentireRob Pittman
Unraveling BatLoader and FakeBat
EugenLoader
2023-12-12FourcoreSwapnil
Rhysida Ransomware: History, TTPs And Adversary Emulation Plans
Rhysida Rhysida Vanilla Tempest
2023-12-12Youtube (OALabs)Sergei Frankoff
Tips For Analyzing Delphi Binaries in IDA (Danabot)
DanaBot
2023-12-12Ukrainska PravdaAlona Mazurenko
Ukrainian intelligence attacks and paralyses Russia's tax system
2023-12-12MicrosoftMicrosoft Threat Intelligence
Threat actors misuse OAuth applications to automate financially driven attacks
Storm-1283 Storm-1286
2023-12-12Check Point ResearchCheck Point
November 2023’s Most Wanted Malware: New AsyncRAT Campaign Discovered while FakeUpdates Re-Entered the Top Ten after Brief Hiatus
FAKEUPDATES AsyncRAT
2023-12-11Lab523722304989, varit0
Mustang Panda’s PlugX new variant targetting Taiwanese government and diplomats
DOPLUGS
2023-12-11Cisco TalosAsheer Malhotra, Jungsoo An, Vitor Ventura
Operation Blacksmith: Lazarus targets organizations worldwide using novel Telegram-based malware written in DLang
BottomLoader DLRAT HazyLoad NineRAT
2023-12-11Sentinel LABSAleksandar Milenkoski, Bendik Hagen
Sandman APT | China-Based Adversaries Embrace Lua
KEYPLUG LuaDream
2023-12-11Washington PostEllen Nakashima, Joseph Menn
China’s cyber army is invading critical U.S. services
2023-12-10Detect FYISimone Kraus
Rhysida Ransomware and the Detection Opportunities
PolyVice Rhysida Vanilla Tempest
2023-12-10cocomelonccocomelonc
Malware development: persistence - part 23. LNK files. Simple Powershell example.
Emotet
2023-12-09Github (struppigel)Karsten Hahn
AST based GootLoader unpacker, C2 extractor and deobfuscator
GootLoader
2023-12-08Twitter (@embee_research)Embee_research
Ghidra Basics - Manual Shellcode Analysis and C2 Extraction
Cobalt Strike
2023-12-08Medium g0njxag0njxa
Approaching stealers devs : a brief interview with Meta
MetaStealer
2023-12-08Security IntelligenceClaire Zaboeva, Golo Mühr, Joe Fasulo
ITG05 operations leverage Israel-Hamas conflict lures to deliver Headlace malware
Headlace
2023-12-08Twitter (@Myrtus0x0)Myrtus 0x0
Tweet naming the family
Latrodectus
2023-12-07GOV.UKGov.UK
UK exposes attempted Russian cyber interference in politics and democratic processes
Callisto
2023-12-07Department of JusticeOffice of Public Affairs
Two Russian Nationals Working with Russia’s Federal Security Service Charged with Global Computer Intrusion Campaign
Callisto
2023-12-07MicrosoftClint Watts
Russian influence and cyber operations adapt for long haul and exploit war fatigue
Storm-1099