Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-05MicrosoftMicrosoft Threat Intelligence
Silk Typhoon targeting IT supply chain
2025-03-04K7 SecurityArun Kumar S, Dhanush
Tracking Emmenhtal
Emmenhtal
2025-03-04Medium (A-poc)A-poc
Black Basta Leak Analysis
Black Basta Black Basta
2025-03-04c/sideHimanshu Anand
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
2025-03-04GeniansGenians
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack
Quasar RAT
2025-03-04NisosNisos
Likely DPRK Network Backstops on GitHub, Targets Companies Globally
2025-03-04Department of JusticeU.S. Attorney's Office Southern District of New York
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government
2025-03-04LinkedIn (Idan Tarab)Idan Tarab
Unmasking New Infrastructure: UAC-0184’s Espionage Activities
2025-03-04SecureworksSecureWorks
GOLD REBELLION
GOLD REBELLION
2025-03-03Trend MicroAdam O'Connor, Catherine Loveria, Gabriel Cardoso, Ian Kenefick, Jack Walsh, Jovit Samaniego, Lucas Silva, Stephen Carbery
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
Black Basta Black Basta Cactus ReedBed
2025-03-02ropgadget.comJeff White
Pivoting on Black Basta's (leaked) Infrastructure
Black Basta Black Basta
2025-03-01LeMagITValéry Rieß-Marchive
Ransomware : de REvil à Black Basta, que sait-on de Tramp ?
Black Basta Black Basta
2025-02-28Intel 471Intel 471
Black Basta exposed: A look at a cybercrime data leak
Black Basta Black Basta
2025-02-28GreynoiseNoah Stone
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
Mirai
2025-02-28Palo Alto Networks Unit 42Margaret Kelley
JavaGhost’s Persistent Phishing Attacks From the Cloud
JavaGhost
2025-02-28KrebsOnSecurityBrian Krebs
Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
FAKEUPDATES GootLoader
2025-02-28CrowdStrikeCrowdStrike
2025 Global Threat Report
GOLD REBELLION UNC4393
2025-02-27IntrinsecEquipe CTI
Doppelgänger: New disinformation campaigns spreading on social media through Russian networks
2025-02-27BushidoTokenwilliam thomas
BlackBasta Leaks: Lessons from the Ascension Health attack
Black Basta
2025-02-27Hunt.ioHunt.io
Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure
Joker