Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-07EuropolEuropol
DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains
2025-05-07US Department of JusticeU.S. Attorney's Officea Northern District of Oklahoma
Case 4:25-cr-00160-JDR: Indictment of Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, Aleksandr Aleksandrovich Shishkin and Dmitriy Rubtsov
TheMoon
2025-05-07FBIFBI
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities
TheMoon
2025-05-07FBIFBI
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers
TheMoon
2025-05-07Palo Alto Networks Unit 42Unit 42
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation
APT35
2025-05-07NTT SecurityMasaya Motoda, Rintaro Koike
Additional Features of OtterCookie Malware Used by WaterPlum
BeaverTail OtterCookie InvisibleFerret
2025-05-06NCSC UKNCSC UK
Authentic Antics: Highly targeted credential and OAuth 2.0 token- stealing malware targeting Outlook
2025-05-06AkamaiKyle Lefton
Here Comes Mirai: IoT Devices RSVP to Active Exploitation
LZRD
2025-05-06InfobloxInfoblox Threat Intelligence Group
Telegram Tango: Dancing with a Scammer
2025-05-06SentinelOneSentinelOne
Protection Against Local Upgrade Technique Described in Aon Research
2025-05-06NCSC SwitzerlandNCSC Switzerland
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II
2025-05-06MandiantMandiant
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
BlackCat DragonForce RansomHub
2025-05-06MandiantMandiant
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
BlackCat DragonForce RansomHub
2025-05-06urlscan.iourlscan.io
Rise of Oriental Gudgeon
2025-05-05BleepingComputerLawrence Abrams
New "Bring Your Own Installer" EDR bypass used in ransomware attack
2025-05-05Hunt.ioHunt.io
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux
2025-05-05Security ChuSecurity Chu
Negotiations with the Akira ransomware group: an ill-advised approach
Akira Akira
2025-05-02Arctic WolfArctic Wolf Labs Team
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims
More_eggs
2025-05-02KrollDave Truman, George Glass, Marc Messer
Prelude: Crypto Heist Causes HAVOC
Havoc
2025-05-01cocomelonccocomelonc
Malware development trick 46: simple Windows keylogger. Simple C example.
MyDoom Nokki RokRAT