Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-12-19SPURSpur Engineering
Astrill VPN and DPRK Remote Worker Fraud
2024-12-19Kaspersky LabsSojun Ryu, Vasily Berdnikov
Lazarus group evolves its infection chain with old and new malware
MISTPEN
2024-12-18Kaspersky LabsKaspersky
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
Babuk LockBit Revenge RAT SparkRAT Cyber Alliance Ukrainian Cyber Alliance
2024-12-18KELAKELA’s Research Team
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives?
2024-12-17SOCRadarSOCRadar
Dark Peep #17: Dark Web Manifesto, Hacker Forums, and Ransomware Misadventures
INDOHAXSEC TEAM
2024-12-17Trend MicroFeike Hacquebord, Stephen Hilt
Earth Koshchei Coopts Red Team Tools in Complex RDP Attacks
2024-12-17BitSightPedro Falé
BADBOX Botnet Is Back
BADBOX
2024-12-17ProofpointDavid Galazin, Konstantin Klinger, Nick Attfield, Pim Trouerbach
Hidden in Plain Sight: TA397’s New Attack Chain Delivers Espionage RATs
MiyaRAT WmRAT HAZY TIGER
2024-12-16GdataBanu Ramakrishnan
New I2PRAT communicates via anonymous peer-to-peer network
Unidentified 118
2024-12-16MorphisecMorphisec Labs, Nadav Lorber
CoinLurker: The Stealer Powering the Next Generation of Fake Updates
ClearFake FAKEUPDATES
2024-12-16Guardio LabsNati Tal
“DeceptionAds” — Fake Captcha Driving Infostealer Infections and a Glimpse to the Dark Side of Internet Advertising
Lumma Stealer
2024-12-15MalwarebytesJérôme Segura
Malicious ad distributes SocGholish malware to Kaiser Permanente employees
FAKEUPDATES
2024-12-13ForcepointPrashant Kumar
VIPKeyLogger Infostealer in the Wild
VIP Keylogger
2024-12-13Bleeping ComputerBill Toulas
Germany blocks BadBox malware loaded on 30,000 Android devices
BADBOX
2024-12-13Medium 0x_b0mb3rLouis Schürmann
Technical Analysis: Magecart Skimmer
magecart
2024-12-13Securite360.netMuffin
A Painful Quickheal
QuickHeal
2024-12-12Bleeping ComputerBill Toulas
New IOCONTROL malware used in critical infrastructure attacks
elf.iocontrol
2024-12-12Hunt.ioHunt.io
Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Broomstick
2024-12-12XLabXLab Team
Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals
Winnti Glutton
2024-12-12KasperskyGeorgy Kucherin & Marc Rivero López
The Mask Has Been Unmasked Again
Careto