Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-06SophosAsha Castle, Hikaru Koike, Sean Gallagher, Trang Tang
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
GootLoader
2024-10-31MicrosoftMicrosoft Threat Intelligence
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
2024-10-18SpyCloudKyla Cardona
A Deep Dive Into the Intricate Chinese Cybercrime Ecosystem
2024-10-08Hunt.ioHunt.io
Inside a Cybercriminal’s Server: DDoS Tools, Spyware APKs, and Phishing Pages
SpyNote
2024-09-30X (@GenThreatLabs)Gen Threat Labs
Tweet on FAKEUPDATES pushing WARMCOOKIE backdoor via compromised websites targeting France
FAKEUPDATES WarmCookie
2024-09-25The RegisterLaura Dobberstein
China claims Taiwan, not civilians, behind web vandalism
Anonymous64
2024-09-20McAfeeAayush Tyagi, Yashvi Shah
Behind the CAPTCHA: A Clever Gateway of Malware
Emmenhtal Lumma Stealer
2024-09-10Talos IntelligenceJoey Chen
DragonRank, a Chinese-speaking SEO manipulator service provider
IISpy PlugX DragonRank
2024-08-21OODA LoopOODA Loop
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
ZeroSevenGroup
2024-08-08NSFOCUSNSFOCUS
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
ABCsync Actor240524
2024-08-05ThreatFabricThreatFabric
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon
2024-08-04Twitter (@embee_research)Embee_research
Decoding a Cobalt Strike Downloader Script With CyberChef
Cobalt Strike
2024-07-09TG SoftGianfranco Tonello, Michele Zuin
Italian government agencies and companies in the target of a Chinese APT
9002 RAT
2024-07-08Solar 4RAYSSolar 4RAYS
Lifting Zmiy: hacking SCADA controllers in pursuit of prime victims
Lifting Zmiy
2024-06-12The Cyber ExpressAshish Khaitan
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias!
Blackmeta
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-05-03Aqua NautilusAqua Nautilus
Kinsing Demystified: A Comprehensive Technical Guide
Kinsing
2024-05-01MicrosoftDimitrios Valsamaras
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps