Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-25SeqriteSathwik Ram Prakki
Umbrella of Pakistani Threats: Converging Tactics of Cyber-operations Targeting India
DISGOMOJI Poseidon Action RAT AllaKore ReverseRAT
2024-07-25TEHTRISTEHTRIS
Daolpu Infostealer: Full analysis of the latest malware exploited post CrowdStrike outage
Daolpu
2024-07-25BlackberryBlackBerry Research and Intelligence team
SideWinder Utilizes New Infrastructure to Target Ports and Maritime Facilities in the Mediterranean Sea
2024-07-25SOC PrimeVeronika Telychko
UAC-0057 Attack Detection: A Surge in Adversary Activity Distributing PICASSOLOADER and Cobalt Strike Beacon
Cobalt Strike PicassoLoader Ghostwriter
2024-07-25CrowdStrikeCounter Adversary Operations
Hacktivist Entity USDoD Claims to Have Leaked CrowdStrike’s Threat Actor List
SAMBASPIDER
2024-07-25SymantecSymantec
Growing Number of Threats Leveraging AI
Broomstick DBatLoader NetSupportManager RAT Rhadamanthys
2024-07-24RadwareRadware
Six-day, 14.7 Million RPS Web DDoS Attack Campaign Attributed to SN_BLACKMETA
Blackmeta
2024-07-24Check Point ResearchAntonis Terefos
Stargazers Ghost Network
Atlantida Lumma Stealer RedLine Stealer Rhadamanthys RisePro Stargazer Goblin
2024-07-24Rapid7Rapid7
Malware Campaign Lures Users With Fake W2 Form
Latrodectus
2024-07-24GoogleAlice Revelli, Fred Plan, JEFF JOHNSON, Michael Barnhart, Taylor Long
APT45: North Korea’s Digital Military Machine
SHATTEREDGLASS APT45
2024-07-24SOC PrimeVeronika Telychko
UAC-0063 Attack Detection: Hackers Target Ukrainian Research Institutions Using HATVIBE, CHERRYSPY, and CVE-2024-23692
UAC-0063
2024-07-24ThreatDownThreatDown
Rhysida using Oyster Backdoor to deliver ransomware
Broomstick Rhysida
2024-07-23SymantecThreat Hunter Team
Daggerfly: Espionage Group Makes Major Update to Toolset
Nightdoor
2024-07-23FortinetFortinet
Exploiting CVE-2024-21412: A Stealer Campaign Unleashed
ACR Stealer Lumma Stealer Meduza Stealer
2024-07-23Hunt.ioHunt.io
A Simple Approach to Discovering Oyster Backdoor Infrastructure
Broomstick
2024-07-23K7 SecurityDhanush
Threat actors target recent Election Results
Crimson RAT
2024-07-22CensysCensys, Embee_research
A Beginner’s Guide to Hunting Malicious Open Directories
Cobalt Strike Lumma Stealer Vidar
2024-07-21cocomelonccocomelonc
Malware and cryptography 30: Khufu payload encryption. Simple C example.
2024-07-18MandiantMike Stokkel
APT41 Has Arisen From the DUST
DUSTTRAP PINEGROVE
2024-07-18MandiantJared Wilson, Jonathan Lepore, Luis Rocha, Mike Stokkel, Pierre Gerlings, RENATO FONTANA, Stephen Eckels
APT41 Has Arisen From the DUST
Cobalt Strike