Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-09-22Medium Mr.AnyThinkMr.AnyThink
Hunting For TamperedChef Infostealer
TamperedChef
2025-09-22EclecticIQArda Büyükkaya
ShinyHunters Calling: Financially Motivated Data Extortion Group Targeting Enterprise Cloud Applications
2025-09-18Hunt.ioHunt.io
Tracking AsyncRAT via Trojanized ScreenConnect and Open Directories
AsyncRAT
2025-09-15Huntress LabsChad Hudson, Michael Elford
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords
Akira
2025-09-11DataBreaches.netDissent
Going Dark: ShinyHunters/ScatteredSpider/LAPSUS$ Say Goodbye (2)
2025-09-10Hunt.ioHunt.io
AdaptixC2 Uncovered: Capabilities, Tactics & Hunting Strategies
AdaptixC2
2025-09-09Huntress LabsJamie Levy, Lindsey O'Donnell-Welch, Michael Tigges
How an Attacker’s Blunder Gave Us a Rare Look Inside Their Day-to-Day Operations
2025-09-02Hunt.ioHunt.io
From Panel to Payload: Inside the TinyLoader Malware Operation
XTinyLoader
2025-08-18TrellixAlex Lanstein, Pham Duy Phuc
The Coordinated Embassy Hunt: Unmasking the DPRK-linked GitHub C2 Espionage Campaign
XenoRAT
2025-08-14Hunt.ioHunt.io
Hunt.io Exposes and Analyzes ERMAC V3.0 Banking Trojan Full Source Code Leak
ERMAC
2025-08-01Reverse The MalwareDiyar Saadi
Threat Hunting with 20 Urlscan.io Search Queries
2025-07-27Cyber Intelligence InsightsVasilis Orlof
Bulletproof Hosting Hunt: Connecting the dots from Lumma to Qwins Ltd (ASN 213702)
Lumma Stealer
2025-06-23RushterArtem Golubin
Threat Hunting Introduction: Cobalt Strike
Cobalt Strike
2025-06-23DarkatlasDarkatlas Squad
Bluenoroff (APT38) Live Infrastructure Hunting
2025-06-19Hunt.ioHunt.io
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
Cobalt Strike
2025-06-18Huntress LabsAlden Schmidt, Jonathan Semon, Stuart Ashenbrenner
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
2025-06-12SymantecCarbon Black, Threat Hunter Team
Fog Ransomware: Unusual Toolset Used in Recent Attack
Fog
2025-06-05Hunt.ioHunt.io
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
AsyncRAT XWorm
2025-05-09LumenChris Formosa, Ryan English
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09LumenBlack Lotus Labs
Classic Rock: Hunting a Botnet that preys on the Old