Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-25The RegisterLaura Dobberstein
China claims Taiwan, not civilians, behind web vandalism
Anonymous64
2024-09-20McAfeeAayush Tyagi, Yashvi Shah
Behind the CAPTCHA: A Clever Gateway of Malware
Emmenhtal Lumma Stealer
2024-09-10Talos IntelligenceJoey Chen
DragonRank, a Chinese-speaking SEO manipulator service provider
IISpy PlugX DragonRank
2024-08-21OODA LoopOODA Loop
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
ZeroSevenGroup
2024-08-08NSFOCUSNSFOCUS
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
ABCsync Actor240524
2024-08-05ThreatFabricThreatFabric
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon
2024-08-04Twitter (@embee_research)Embee_research
Decoding a Cobalt Strike Downloader Script With CyberChef
Cobalt Strike
2024-07-30Cyfirmacyfirma
Mint Stealer: A Comprehensive Study of a Python-Based Information Stealer
MintStealer
2024-07-09TG SoftGianfranco Tonello, Michele Zuin
Italian government agencies and companies in the target of a Chinese APT
9002 RAT
2024-07-08Solar 4RAYSSolar 4RAYS
Lifting Zmiy: hacking SCADA controllers in pursuit of prime victims
Lifting Zmiy
2024-06-13Github (LambdaMamba)Lena Yu
Implementation of a Config Decryptor for Amadey
Amadey
2024-06-12The Cyber ExpressAshish Khaitan
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias!
Blackmeta
2024-06-11KrollGeorge Glass, Keith Wojcieszek, Laurie Iacono
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability
PLAY
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-05-03Aqua NautilusAqua Nautilus
Kinsing Demystified: A Comprehensive Technical Guide
Kinsing
2024-05-01MicrosoftDimitrios Valsamaras
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
2024-04-19dissect.ingScottish Fold
Exploiting a cryptographic vulnerability inside the Donex Ransomware
Donex
2024-04-15UC Santa CruzAlonso Rojas, Alvaro A. Cardenas, Bing Huang, Emmanuele Zambon, Juan Lozano, Keerthi Koneru, Luis Salazar, Marina Krotofil, Ross Baldick, Sebastian R. Castro
A Tale of Two Industroyers: It was the Season of Darkness
Industroyer INDUSTROYER2