Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-07FortinetFaisal Abdul Malik Qureshi, Fred Gutierrez, Hossein Jazi, John Simmons, Mark Robson, Said Wali, Xiaopeng Zhang
Investigating Iranian Intrusion into Strategic Middle East Critical Infrastructure
Havoc
2025-03-07Youtube (greenplan)greenplan
[BINARY REFINERY] (MintsLoader) - Writing a Unit to deobfuscated JavaScript payload
MintsLoader
2025-03-07ProofpointOle Villadsen, Proofpoint Threat Research Team, Selena Larson
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice
2025-03-07MalwareAnalysisSpaceSeeker
Akira Ransomware Expands to Linux: the attacking abilities and strategies
Akira
2025-03-06Orange CyberdefenseOrange Cyberdefense
Dossier Bybit : Le plus gros hack de l’histoire de la finance
2025-03-06flareEstelle Ruellan, Oleg Lypko, Tammy Harper
Deciphering Black Basta’s Infrastructure from the Chat Leak
Black Basta Black Basta
2025-03-06Outpost24KrakenLabs
Unveiling EncryptHub: Analysis of a multi-stage malware campaign
Rhadamanthys
2025-03-06Palo Alto Networks Unit 42Janos Szurdi, Reethika Ramesh
The Next Level: Typo DGAs Used in Malicious Redirection Chains
2025-03-06Twitter (@MsftSecIntel)Microsoft Threat Intelligence
Tweet about Moonstone Sleet dropping Qilin ransomware
Qilin
2025-03-06Medium SarvivaMalwareAnalystsarviya
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication
XWorm
2025-03-05HUMANAdam Sell, Aviad Kaiserman, Gabi Cirlig, Inna Vasilyeva, Joao Marques, João Santos, Lindsay Kaye, Louisa Abel, Maor Elizen, Mikhail Venkov, Nico Agnese, Vikas Parthasarathy, Will Herbig
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes
BADBOX
2025-03-05Trend MicroTrendmicro
Water Ouroboros
Hunters International SharpRhino
2025-03-05eSentireSpence Hutchinson
Initial Takeaways from the Black Basta Chat Leaks
Black Basta Black Basta
2025-03-05CyberScoopTim Starks
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
2025-03-05MicrosoftMicrosoft Threat Intelligence
Silk Typhoon targeting IT supply chain
2025-03-04K7 SecurityArun Kumar S, Dhanush
Tracking Emmenhtal
Emmenhtal
2025-03-04Medium (A-poc)A-poc
Black Basta Leak Analysis
Black Basta Black Basta
2025-03-04c/sideHimanshu Anand
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
2025-03-04GeniansGenians
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack
Quasar RAT
2025-03-04NisosNisos
Likely DPRK Network Backstops on GitHub, Targets Companies Globally