Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-10DFIR.chStephan Berger
Reptile's Custom Kernel-Module Launcher
reptile
2024-10-08TrustwaveCris Tomboc, King Orande
Pronsis Loader: A JPHP-Driven Malware Diverging from D3F@ck Loader
Pronsis Loader Latrodectus Lumma Stealer
2024-09-12Cado SecurityNate Bill, Tara Gould
From Automation to Exploitation: The Growing Misuse of Selenium Grid for Cryptomining and Proxyjacking
perfctl
2024-08-30Denwp ResearchTonmoy Jitu
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages - Part 1
Lumma Stealer
2024-08-29ProofpointPim Trouerbach, Selena Larson, Tommy Madjar
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Voldemort
2024-08-21OODA LoopOODA Loop
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
ZeroSevenGroup
2024-08-20SiliconAngleDuncan Riley
Toyota alleges stolen customer data published on hacking site came from outside supplier
ZeroSevenGroup
2024-07-26TrellixMathanraj Thangaraju, Max Kersten, Tomer Shloman
Handala’s Wiper Targets Israel
Handala Hatef Handala
2024-07-16JPCERT/CCShusei Tomonaga
MirrorFace Attack against Japanese Organisations
LODEINFO NOOPDOOR
2024-07-15SekoiaSekoia TDR
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
bugsleep
2024-06-28Trend MicroAhmed Mohamed Ibrahim, Shubham Singh, Sunil Bharti
Examining Water Sigbin's Infection Routine Leading to an XMRig Cryptominer
Water Sigbin
2024-06-25Cado SecurityNate Bill
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect
2024-06-03SpyCloudJames
Reversing Atomic macOS Stealer: Binaries, Backdoors & Browser Theft
AMOS
2024-05-30AkamaiMaxim Zavodchik, Ryan Barnett, Stiv Kupchik
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
RedTail
2024-05-07GatewatcherGatewatcher
Cybercrime's Anatomy Threats to the Healthcare World
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-04-22MicrosoftMicrosoft Threat Intelligence
Analyzing Forest Blizzard’s custom post-compromise tool for exploiting CVE-2022-38028 to obtain credentials
GooseEgg
2024-04-10ProofpointSelena Larson, Tommy Madjar
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
Rhadamanthys
2024-04-08ZscalerNikolaos Pantazopoulos
Automating Pikabot’s String Deobfuscation
Pikabot
2024-03-18Perception PointAriel Davidpur, Peleg Cabra
Operation PhantomBlu: New and Evasive Method Delivers NetSupport RAT
NetSupportManager RAT