Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-23Hunt.ioHunt.io
A Simple Approach to Discovering Oyster Backdoor Infrastructure
Broomstick
2024-07-23K7 SecurityDhanush
Threat actors target recent Election Results
Crimson RAT
2024-07-22Cyber ShafaratTreadstone 71
Hacking group Anonymous KSA, a notorious threat actor, is targeting India in a series of cyber attacks
Anonymous KSA
2024-07-21Cert-UACert-UA
UAC-0063 Attacks Research Institutions of Ukraine: HATVIBE + CHERRYSPY + CVE-2024-23692 (CERT-UA#10356)
HATVIBE
2024-07-16Recorded FutureInsikt Group
TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies
SparkRAT Storm-2077
2024-07-16Recorded FutureInsikt Group
TAG-100 Uses Open-Source Tools in Suspected Global Espionage Campaign, Compromising Two Asia-Pacific Intergovernmental Bodies
Cobalt Strike
2024-07-16Sentinel LABSJim Walter
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI
AsyncRAT LockBit XWorm Nullbulge
2024-07-16JPCERT/CCShusei Tomonaga
MirrorFace Attack against Japanese Organisations
LODEINFO NOOPDOOR
2024-07-15SekoiaSekoia TDR
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
bugsleep
2024-07-15Check PointCheckpoint Research
New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns
bugsleep
2024-07-15TrendmicroAliakbar Zahravi, Peter Girnus
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Void Banshee
2024-07-15Trend MicroAliakbar Zahravi, Peter Girnus
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
2024-07-14PhylumPhylum Research Team
Fake AWS Packages Ship Command and Control Malware In JPEG Files
2024-07-11GoogleDianaE
Finding Malware: Detecting EMPTYSPACE with Google Security Operations
Vetta Loader
2024-07-11sysdigMiguel Hernández
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools
CRYSTALRAY
2024-07-11McAfeeVignesh Dhatchanamoorthy, Yashvi Shah
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
DarkGate Lumma Stealer
2024-07-09Twitter (@H4ckManac)HackManac
Tweet on data breaches caused by 888 group
Threat Actor 888
2024-07-08Solar 4RAYSSolar 4RAYS
Lifting Zmiy: hacking SCADA controllers in pursuit of prime victims
Lifting Zmiy
2024-07-06unknown
xeno-RAT open-source remote access tool (RAT)
XenoRAT
2024-07-05Weixin360 Threat Intelligence Center
APT-C-26 (Lazarus) uses PyPI to attack Windows, Linux, and macOS platforms
SimpleTea SimpleTea