Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-03BitSightBitsight TRACE
PROXY.AM Powered by Socks5Systemz Botnet
Socks5 Systemz
2024-12-02Red CanaryRed Canary Intelligence
Storm-1811 exploits RMM tools to drop Black Basta ransomware
UNC4393
2024-12-02TechSpotAlfonso Maruccia
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale
Massgrave
2024-12-02Kaspersky LabsArtem Ushkov
Horns&Hooves campaign delivers NetSupport RAT and BurnsRAT
NetSupportManager RAT RMS
2024-12-02FortiGuard LabsPei Han Liao
SmokeLoader Attack Targets Companies in Taiwan
SmokeLoader
2024-12-02Medium b.magnezi0xMrMagnezi
LokiBot Malware Analysis
Loki Password Stealer (PWS)
2024-11-30Technical Evolutiontechevo
REKOOBE APT-31 Linux Backdoor Analysis
Rekoobe
2024-11-29FortinetFred Gutierrez, Shunichi Imano
Ransomware Roundup - Interlock
Interlock Interlock Supper
2024-11-28StrikeReadyStrikeReady Labs
RU APT targeting Energy Infrastructure (Unknown unknowns, part 3)
Edam Emmenhtal
2024-11-27ESET ResearchMartin Smolár, Peter Strýček
Bootkitty: Analyzing the first UEFI bootkit for Linux
Bootkitty
2024-11-26Reco AIGal Nakash
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage
ElizaRAT Operation C-Major
2024-11-26Trend MicroHara Hiroaki
Guess Who’s Back - The Return of ANEL in the Recent Earth Kasha Spear-phishing Campaign in 2024
Anel MirrorFace
2024-11-26Security IntelligenceNir Somech
What’s up India? PixPirate is back and spreading via WhatsApp
PixPirate
2024-11-26Security AffairsPierluigi Paganini
The source code of Banshee Stealer leaked online
BANSHEE
2024-11-25LinkedIn (Idan Tarab)Idan Tarab
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield
2024-11-22MicrosoftMicrosoft Threat Intelligence
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Storm-2077
2024-11-22WiredAndy Greenberg
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
APT28
2024-11-21Rapid7Anna Širokova
A Bag of RATs: VenomRAT vs. AsyncRAT
AsyncRAT Venom RAT
2024-11-21Hunt.ioHunt.io
DarkPeony’s Trail: Certificate Patterns Point to Sustained Campaign Infrastructure
DOPLUGS