Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-05CloudwaysAbdul Rehman
Hacker Allegedly Leaks Data from Shopify Breach on BreachForums
Threat Actor 888
2024-06-27Palo Alto Networks Unit 42Unit 42
Threat Actor Groups Tracked by Palo Alto Networks Unit 42
GOLD REBELLION
2024-06-27QuoIntelligenceAndrei Moldovan
Analyzing the Shift in Ransomware Dynamics: The Impact of Law Enforcement and Future Outlooks
APT73
2024-06-27The Cyber ExpressEditorial
AzzaSec, NoName Cyberattackers Join Hands to Potentially Target Pro-Ukriane Allies
AzzaSec
2024-06-27GovCERT.chGovCERT.ch
Poseidon Stealer malspam campaign targeting Swiss macOS users
Poseidon Stealer
2024-06-26SentinelOneAleksandar Milenkoski, Julian-Ferdinand Vögele
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware
CatB Chamelgang
2024-06-24CySecurity NewsCySecurity News
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code
IntelBroker
2024-06-24SonicWallSonicWall
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe
StrelaStealer
2024-06-24Malwarebytes LabsJérôme Segura
‘Poseidon’ Mac stealer distributed via Google ads
Poseidon Stealer
2024-06-21Group-IBGroup-IB
Boolka Unveiled: From web attacks to modular malware
BMANAGER Boolka
2024-06-21ElasticJoe Desimone, Samir Bousseaden
GrimResource - Microsoft Management Console for initial access and evasion
Cobalt Strike
2024-06-20SOCRadarSOCRadar
Dark Web Profile: SpaceBears
SpaceBears
2024-06-20cocomelonccocomelonc
Linux malware development 1: Intro to kernel hacking. Simple C example.
2024-06-20CleafyFederico Valentini, Simone Mattia
Medusa Reborn: A New Compact Variant Discovered
Medusa TangleBot
2024-06-20Hunt.ioMichael R
Caught in the Act: Uncovering SpyNote in Unexpected Places
SpyNote
2024-06-19FortinetPei Han Liao
Fickle Stealer Distributed via Multiple Attack Chain
Fickle Stealer
2024-06-19Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi, Peter Girnus
Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework
ValleyRAT Void Arachne
2024-06-19ANSSIANSSI
Malicious activities linked to the Nobelium intrusion set
WINELOADER
2024-06-19BartBlaze, Nguyen Nguyen
New North Korean based backdoor packs a punch
NikiHTTP
2024-06-17CySecurity NewsCySecurity News
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum
Sp1d3r