Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-14Trend MicroAdam O'Connor, Ian Kenefick, Jack Walsh, Laura Medina, Lucas Silva
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
FAKEUPDATES RansomHub
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-13Group-IBGroup-IB
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims
Emmenhtal Lumma Stealer
2025-03-13Linkedin (ThreatMon)Aziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Chrome DLL Manipulation Attack Exposed
2025-03-12MandiantFrank Tse, Jakub Jozwiak, Logeswaran Nadarajan, Lukasz Lamparski, Mathew Potaczek, Mustafa Nasser, Nick Harbour, Punsaen Boonyakarn, Shawn Chew
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
tsh
2025-03-11The Hacker NewsRavie Lakshmanan
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks
AsyncRAT NjRAT Quasar RAT Remcos
2025-03-11Trend MicroCj Arsley Mateo, Darrel Tristan Virtusio, Jacob Santos, Junestherry Dela Cruz, Paul John Bardon
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution
Lumma Stealer SmartLoader
2025-03-11Kaspersky LabsAMR
DCRat backdoor returns
DCRat
2025-03-11ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
New Ermac Variant - Android Banking Trojan & Botnet
ERMAC
2025-03-10CofenseMax Gannon
Trump Cryptocurrency Delivers ConnectWise RAT
2025-03-07ProofpointOle Villadsen, Proofpoint Threat Research Team, Selena Larson
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice
2025-03-07MalwareAnalysisSpaceSeeker
Akira Ransomware Expands to Linux: the attacking abilities and strategies
Akira
2025-03-06Twitter (@MsftSecIntel)Microsoft Threat Intelligence
Tweet about Moonstone Sleet dropping Qilin ransomware
Qilin
2025-03-06Medium SarvivaMalwareAnalystsarviya
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication
XWorm
2025-03-05CyberScoopTim Starks
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
2025-03-05MicrosoftMicrosoft Threat Intelligence
Silk Typhoon targeting IT supply chain
2025-03-04c/sideHimanshu Anand
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
2025-03-04GeniansGenians
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack
Quasar RAT
2025-03-04Department of JusticeU.S. Attorney's Office Southern District of New York
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government
2025-03-04Hunt.ioHunt.io
Exposing Russian EFF Impersonators: The Inside Story on Stealc & Pyramid C2
Pyramid Stealc