Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-07Cert-UACert-UA
Targeted cyberattacks UAC-0185 in relation to the Defense Forces and enterprises of defense systems of Ukraine (CRT-UA#12414)
UAC-0185
2024-12-06OALabsSergei Frankoff
CryptBot Evolution Tracking the many iterations of this stealer
CryptBot
2024-12-05Trend MicroDaniel Lunghi, Joseph Chen
MOONSHINE Exploit Kit and DarkNimbus Backdoor Enabling Earth Minotaur’s Multi-Platform Attacks
2024-12-05LinkedIn (Idan Tarab)Idan Tarab
The Diplomatic Deception: Patchwork’s Use of Fake U.S. Embassy Alerts in Cyber Espionage
2024-12-05Orange CyberdefenseAlexandre Matousek, Marine PICHON
Edam Dropper
Edam Emmenhtal
2024-12-04Rapid7Tyler McGraw
Black Basta Ransomware Campaign Drops Zbot, DarkGate, and Custom Malware
Black Basta Cobalt Strike DarkGate SystemBC Zloader
2024-12-04MicrosoftMicrosoft Threat Intelligence
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Crimson RAT MiniPocket TwoDash Wainscot Operation C-Major Storm-0473
2024-12-04CleafyAlessandro Strino, Federico Valentini, Simone Mattia
DroidBot: Insights from a new Turkish MaaS fraud operation
DroidBot
2024-12-03Hunt.ioHunt.io
Rare Watermark Links Cobalt Strike 4.10 Team Servers to Ongoing Suspicious Activity
Cobalt Strike
2024-12-02Kaspersky LabsArtem Ushkov
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT
NetSupportManager RAT RMS
2024-12-02FortiGuard LabsPei Han Liao
SmokeLoader Attack Targets Companies in Taiwan
SmokeLoader
2024-11-28Hunt.ioHunt.io
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
XWorm
2024-11-27Rapid7Natalie Zargarov
New “CleverSoar” Installer Targets Chinese and Vietnamese Users
ValleyRAT
2024-11-26Reco AIGal Nakash
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage
ElizaRAT Operation C-Major
2024-11-26Security IntelligenceNir Somech
What’s up India? PixPirate is back and spreading via WhatsApp
PixPirate
2024-11-25LinkedIn (Idan Tarab)Idan Tarab
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield
2024-11-22MicrosoftMicrosoft Threat Intelligence
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Storm-2077
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
APT28
2024-11-21Rapid7Anna Širokova
A Bag of RATs: VenomRAT vs. AsyncRAT
AsyncRAT Venom RAT
2024-11-21Hunt.ioHunt.io
DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure
DOPLUGS