Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-02cocomelonccocomelonc
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples
2025-08-02Reverse The MalwareDiyar Saadi
Analysis of a Facebook Phishing Page
2025-08-01Nextron SystemsPezier Pierre-Henri
Plague: A Newly Discovered PAM-Based Backdoor for Linux
Plague
2025-07-31Reverse The MalwareDiyar Saadi
SysTracer: Another Suite for Digital Forensics and Incident Response
2025-07-31Reverse The MalwareDiyar Saadi
ArtiFast Forensics Artifacts Investigation - ShellBags
2025-07-30cocomelonccocomelonc
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example.
2025-07-30GBHackers on SecurityLucas Mancilha
Lazarus Group enhances malware delivery by using new techniques
OtterCookie
2025-07-28Kyiv IndependentMartin Fornusek
Hacker group claims responsibility for cyberattack on Russia's Aeroflot
2025-07-27Bleeping ComputerBill Toulas
Scattered Spider is running a VMware ESXi hacking spree
2025-07-26Reverse The MalwareDiyar Saadi
User History Artifact : Practical Gathering of Artifacts
2025-07-26Reverse The MalwareDiyar Saadi
Forensic Artifacts for User Windows History Activity
2025-07-25CloudsekCloudsek
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware
Epsilon Red
2025-07-24The Washington TimesBill Gertz
Hackers breach intelligence website used by CIA
2025-07-24Bleeping ComputerSergiu Gatlan
BlackSuit ransomware extortion sites seized in Operation Checkmate
BlackSuit Royal Ransom BlackSuit Mount Locker Royal Ransom
2025-07-23OPFOR JournalOPFOR Journal
Singapore Takes Unprecedented Military Action Against Chinese State-Sponsored Hackers
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603
2025-07-20rmceoin.github.ioRandy McEoin
Perl based macOS/linux Stealer
Pearl Stealer
2025-07-20Invoke REcyb3rjerry, Josh Reynolds
Scavenger Malware Distributed via eslint-config-prettier NPM Package Supply Chain Compromise
Scavenger
2025-07-18cocomelonccocomelonc
MacOS hacking part 6: Assebmly intro on ARM(M1). Simple NASM (M1) examples