Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-28Talos IntelligenceCraig Jackson, James Nutland, Terryn Valikodath
BlackByte blends tried-and-true tradecraft with newly disclosed vulnerabilities to support ongoing attacks
BlackByte
2024-08-26NetskopeLeandro Froes
Static Unpacker for Latrodectus
Latrodectus
2024-08-26The DFIR ReportThe DFIR Report
BlackSuit Ransomware
BlackSuit Cobalt Strike SystemBC
2024-08-20Intel 471Intel 471
Threat Hunting Case Study: Tracking Down GootLoader
GootLoader
2024-08-19AonDaniel Stein, Joshua Pivirotto, Stroz Friedberg, Zachary Reichert
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules
sedexp
2024-08-09BreachNovaOsama Ellahi
Full analysis on NJRAT
NjRAT
2024-08-08cybleCyble Research Labs
Double Trouble: Latrodectus and ACR Stealer observed spreading via Google Authenticator Phishing Site
ACR Stealer Latrodectus
2024-08-05BreachNovaOsama Ellahi
How attacker achive Email Spoofing, Message Spoofing, IP and UserAgent Spoofing
2024-08-01ElasticDaniel Stepanic, Seth Goodwin
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor
BITSloth
2024-07-31SecuronixSecuronix
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering
BeaverTail
2024-07-30HackReadWAQAS
Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List
SAMBASPIDER
2024-07-26SOC PrimeVeronika Telychko
UAC-0102 Phishing Attack Detection: Hackers Steal Authentication Data Impersonating the UKR.NET Web Service
UAC-0102
2024-07-25BlackberryBlackBerry Research and Intelligence team
SideWinder Utilizes New Infrastructure to Target Ports and Maritime Facilities in the Mediterranean Sea
2024-07-25SOC PrimeVeronika Telychko
UAC-0057 Attack Detection: A Surge in Adversary Activity Distributing PICASSOLOADER and Cobalt Strike Beacon
Cobalt Strike PicassoLoader Ghostwriter
2024-07-25CrowdStrikeCounter Adversary Operations
Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
SAMBASPIDER
2024-07-24GoogleAlice Revelli, Fred Plan, JEFF JOHNSON, Michael Barnhart, Taylor Long
APT45: North Korea’s Digital Military Machine
SHATTEREDGLASS APT45
2024-07-24SOC PrimeVeronika Telychko
UAC-0063 Attack Detection: Hackers Target Ukrainian Research Institutions Using HATVIBE, CHERRYSPY, and CVE-2024-23692
UAC-0063
2024-07-24ThreatDownThreatDown
Rhysida using Oyster Backdoor to deliver ransomware
Broomstick Rhysida
2024-07-23Hunt.ioHunt.io
A Simple Approach to Discovering Oyster Backdoor Infrastructure
Broomstick
2024-07-23K7 SecurityDhanush
Threat actors target recent Election Results
Crimson RAT