Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-29ElasticElastic, Jia Yu Chan
MaaS Appeal: An Infostealer Rises From The Ashes
Nova Stealer
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident
2025-06-18ElasticSalim Bitam
A Wretch Client: From ClickFix deception to information stealer deployment
HijackLoader Lumma Stealer SectopRAT
2025-06-18Huntress LabsAlden Schmidt, Jonathan Semon, Stuart Ashenbrenner
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
2025-06-16ProofpointJeremy Hedges, Proofpoint Threat Research Team, Tommy Madjar
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication
ACR Stealer Amatera
2025-05-29ElasticJia Yu Chan
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns
EDDIESTEALER
2025-05-22ElasticDaniel Stepanic
De-obfuscating ALCATRAZ
DOUBLELOADER Rhadamanthys
2025-05-20US Department of DefenseUS Department of Defense
Russian GRU Targeting Western Logistics Entities and Technology Companies
STEELHOOK MASEPIE Headlace
2025-05-09US Department of JusticeU.S. Attorney's Office, Northern District of Oklahoma
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
TheMoon
2025-05-07US Department of JusticeU.S. Attorney's Officea Northern District of Oklahoma
Case 4:25-cr-00160-JDR: Indictment of Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, Aleksandr Aleksandrovich Shishkin and Dmitriy Rubtsov
TheMoon
2025-03-10Check Point ResearchCheck Point Research
Blind Eagle: …And Justice for All
Remcos
2025-03-04Department of JusticeU.S. Attorney's Office Southern District of New York
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government
2025-02-27ElasticRuben Groenewoud
Linux Detection Engineering - The Grand Finale on Linux Persistence
PANIX
2025-02-13ElasticAndrew Pease, Seth Goodwin
From South America to Southeast Asia: The Fragile Web of REF7707
FINALDRAFT FINALDRAFT GUIDLOADER PATHLOADER REF7707
2025-02-13ElasticCyril François, Daniel Stepanic, Jia Yu Chan, Salim Bitam
You've Got Malware: FINALDRAFT Hides in Your Drafts
FINALDRAFT FINALDRAFT PATHLOADER
2025-02-05BitdefenderAlina Bizga, Andrei ANTON-AANEI
Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam
tsunami
2025-01-30Department of JusticeU.S. Attorney's Office Southern District of Texas
Cybercrime websites selling hacking tools to transnational organized crime groups seized
2025-01-15HabrF.A.C.C.T. Information security
F.A.C.C.T. found new attacks of pro-Ukrainian cyber spies Sticky Werewolf
Ozone RAT
2025-01-14Department of JusticeOffice of Public Affairs
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers
PlugX