Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-24SYGNIASygnia Team
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation
CHINACHOPPER reGeorg
2025-03-20Cisco TalosAsheer Malhotra, Brandon White, Jungsoo An, Vitor Ventura
UAT-5918 targets critical infrastructure entities in Taiwan
ShortLeash LaZagne JuicyPotato Meterpreter MimiKatz ShortLeash UAT-5918
2025-03-20ESET ResearchMatthieu Faou
Operation FishMedley
ShadowPad SodaMaster Spyder Earth Lusca FishMedley
2025-03-19cocomelonccocomelonc
MD MZ Book: Russian translation
2025-03-19Natto ThoughtsNatto Team
Zhou Shuai: A Hacker’s Road to APT27
2025-03-18TrellixJambul Tologonov, John Fokker
Analysis of Black Basta Ransomware Chat Leaks
Black Basta Black Basta
2025-03-18ExpelAARON WALTON
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back)
Black Basta Black Basta
2025-03-18WeLiveSecurityDominik Breitenbacher
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
Anel AsyncRAT
2025-03-17GoDaddyDenis Sinegubko
DollyWay World Domination: Eight Years of Evolving Website Malware Campaigns
DollyWay
2025-03-17CloudflareCloudflare
Black Basta’s blunder: exploiting the gang’s leaked chats
Black Basta Black Basta
2025-03-16SYGNIASygnia Team
Bybit – What We Know So Far
2025-03-15DeXposeM4lcode
Understanding SalatStealer: Features and Impact
SalatStealer
2025-03-14VitalDigitalForensicsv4ensics
Lumma Stealer – A tale that starts with a fake Captcha
Lumma Stealer
2025-03-14Trend MicroAdam O'Connor, Ian Kenefick, Jack Walsh, Laura Medina, Lucas Silva
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware
FAKEUPDATES RansomHub
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-13SecuronixDen Iyzvyk, Tim Peck
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits
Quasar RAT r77
2025-03-13EclecticIQArda Büyükkaya
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices
Black Basta
2025-03-13ForescoutForescout Research, Sai Molige
New Ransomware Operator Exploits Fortinet Vulnerability Duo
BlackMatter LockBit Mora_001
2025-03-13Group-IBGroup-IB
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims
Emmenhtal Lumma Stealer
2025-03-13Linkedin (ThreatMon)Aziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Chrome DLL Manipulation Attack Exposed