Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-10Check Point ResearchCheck Point Research
Blind Eagle: …And Justice for All
Remcos
2025-03-04Department of JusticeU.S. Attorney's Office Southern District of New York
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government
2025-02-27ElasticRuben Groenewoud
Linux Detection Engineering - The Grand Finale on Linux Persistence
PANIX
2025-02-13ElasticCyril François, Daniel Stepanic, Jia Yu Chan, Salim Bitam
You've Got Malware: FINALDRAFT Hides in Your Drafts
FINALDRAFT FINALDRAFT PATHLOADER
2025-02-05BitdefenderAlina Bizga, Andrei ANTON-AANEI
Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam
tsunami
2025-01-30Department of JusticeU.S. Attorney's Office Southern District of Texas
Cybercrime websites selling hacking tools to transnational organized crime groups seized
2025-01-15HabrF.A.C.C.T. Information security
F.A.C.C.T. found new attacks of pro-Ukrainian cyber spies Sticky Werewolf
Ozone RAT
2025-01-14Department of JusticeOffice of Public Affairs
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers
PlugX
2024-12-12ElasticDaniel Stepanic, Elastic Security Labs, Jia Yu Chan, Salim Bitam, Seth Goodwin
Under the SADBRIDGE with GOSAR: QUASAR Gets a Golang Rewrite
Gosar Quasar RAT SADBRIDGE
2024-11-09Youtube (Microsoft Security Response Center (MSRC))Rachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0506 TA2101
2024-11-09MicrosoftRachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0826
2024-10-21Ministry of Justice and SecurityNational Coordinator for Counterterrorism and Security
Cyber Security Picture Netherlands 2024
2024-10-19ElasticSalim Bitam
Tricks and Treats: GHOSTPULSE’s new pixel- level deception
HijackLoader
2024-10-15MicrosoftAkash Chaudhuri, Gourav Khandelwal, Krithika Ramakrishnan, Matthew Mesa, Sagar Patil, Uri Oren
Phish, Click, Breach: Hunting for a Sophisticated Cyber Attack
UNC4393
2024-10-13ElasticRemco Sprooten, Ruben Groenewoud
Declawing PUMAKIT
PUMAKIT
2024-10-12QianxinQianxin Threat Intelligence Center
Bitter Group Launches New Trojan Miyarat, Domestic Users Become Primary Ttargets
MiyaRAT
2024-10-10US Department of DefenseCNMF, NCSC UK, NSA, US Department of Justice
Update on SVR Cyber Operations and Vulnerability Exploitation
2024-10-03Virus BulletinSalim Bitam
Sugarcoating KANDYKORN: a sweet dive into a sophisticated MacOS backdoor
HLOADER KANDYKORN SUGARLOADER
2024-10-03US Department of JusticeOffice of Public Affairs
Justice Department Disrupts Russian Intelligence Spear-Phishing Efforts
Callisto
2024-09-27ElasticRemco Sprooten, Ruben Groenewoud
Betting on Bots: Investigating Linux malware, crypto mining, and gambling API abuse
Kaiji RudeDevil