Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-10ESET ResearchJakub Souček
CosmicBeetle steps up: Probation period at RansomHub
Scarab Ransomware SpaceColon CosmicBeetle
2024-09-10CleafyAlessandro Strino, Michele Roviello
A new TrickMo saga: from Banking Trojan to Victim's Data Leak
TrickMo
2024-09-10ReversingLabsKarlo Zanki
Fake recruiter coding tests target devs with malicious Python packages
2024-09-10Talos IntelligenceJoey Chen
DragonRank, a Chinese-speaking SEO manipulator service provider
IISpy PlugX DragonRank
2024-09-10ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ailurophile Stealer Technical Malware Analysis Report
2024-09-09Github (itaymigdal)Itay Migdal
Poshito - New Telegram C2
2024-09-09Denwp ResearchTonmoy Jitu
Dissecting Lumma Malware: Analyzing the Fake CAPTCHA and Obfuscation Techniques - Part 2
Lumma Stealer
2024-09-09SC MagazineSC Staff
Significant ransom payment by major Iranian IT firm underway
IRLeaks
2024-09-09CleafyCleafy
Tweet about malware version Octo 2
Coper
2024-09-09LinkedIn (Idan Tarab)Idan Tarab
APT CoralRaider Expands Arsenal: AmadeyBot, FTP Innovations, and Complex Domain Strategy
Amadey
2024-09-08WiredAndy Greenberg
A (Strange) Interview With the Russian-Military-Linked Hackers Targeting US Water Utilities
2024-09-06Trend MicroPierre Lee, Vickie Su
TIDRONE Targets Military and Satellite Industries in Taiwan
TIDRONE
2024-09-06splunkSplunk Threat Research Team
Handala’s Wiper: Threat Analysis and Detections
Handala Hatef Handala
2024-09-06Risky.bizCatalin Cimpanu
Risky Biz News: Doppelganger gets a kick in the butt from Uncle Sam
RaHDit
2024-09-06SpyCloudJames
The Curious Case of an Open Source Stealer: Phemedrone
Phemedrone Stealer
2024-09-05FortinetCara Lin, Vincent Li
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
SideWalk
2024-09-05Kaspersky LabsSherif Magdy
Tropic Trooper spies on government entities in the Middle East
2024-09-05IntegoJoshua Long
New macOS malware HZ RAT gives attackers backdoor access to Macs
HZ RAT
2024-09-04Check PointCheck Point
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
EvilWeb RipperSec
2024-09-04ANY.RUNANY.RUN, Mostafa ElSheimy
AZORult Malware: Technical Analysis
Azorult