Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-05Cyfirmacyfirma
Hamas Leadership Assassination Explainer
Evilbyte
2024-08-05ThreatFabricThreatFabric
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon
2024-08-05BreachNovaOsama Ellahi
How attacker achive Email Spoofing, Message Spoofing, IP and UserAgent Spoofing
2024-08-04Twitter (@embee_research)Embee_research
Decoding a Cobalt Strike Downloader Script With CyberChef
Cobalt Strike
2024-08-02Palo Alto Networks Unit 42Unit 42
Fighting Ursa Luring Targets With Car for Sale
Headlace
2024-08-02Quorum CyberQuorum Cyber
SharpRhino – New Hunters International RAT Identified by Quorum Cyber
SharpRhino
2024-08-02Aqua NautilusAssaf Morag
Panamorfi: A New Discord DDoS Campaign
Mineping
2024-08-02VolexityAnkur Saini, Paul Rascagnères, Steven Adair, Thomas Lancaster
StormBamboo Compromises ISP to Abuse Insecure Software Update Mechanisms
CDDS DUSTPAN MgBot
2024-08-01CiscoAshley Shen, Joey Chen, Vitor Ventura
APT41 likely compromised Taiwanese government-affiliated research institute with ShadowPad and Cobalt Strike
Cobalt Strike ShadowPad
2024-08-01ElasticDaniel Stepanic, Seth Goodwin
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor
BITSloth
2024-08-01KrakzPierre Le Bourhis
Latrodectus dropped by BR4
Brute Ratel C4 Latrodectus
2024-08-01Intel 471Intel 471
BlankBot - a new Android banking trojan with screen recording, keylogging and remote control capabilities
BlankBot
2024-07-31CleafyAlessandro Strino, Simone Mattia
BingoMod: The new android RAT that steals money and wipes data
BingoMod
2024-07-31SecuronixSecuronix
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering
BeaverTail
2024-07-30HackReadWAQAS
Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List
SAMBASPIDER
2024-07-30SpamhausSpamhaus Team
Too big to care? - Our disappointment with Cloudflare’s anti-abuse posture
2024-07-29cocomelonccocomelonc
Malware and cryptography 31: CAST-128 payload encryption. Simple C example.
2024-07-29loginsoftSaharsh Agrawal
Blue Screen Mayhem: When CrowdStrike's Glitch Became Threat Actor's Playground
Daolpu HijackLoader Remcos
2024-07-29MicrosoftCharles-Edouard Bettan, Danielle Kuznets Nohi, Edan Zwick, Meitar Pinto, Vaibhav Deshmukh
Ransomware operators exploit ESXi hypervisor vulnerability for mass encryption
Black Basta Black Basta Storm-0506
2024-07-29MandiantAshley Pearson, Jake Nicastro, Joseph Pisano, Josh Murchie, Joshua Shilko, Raymond Leong
UNC4393 Goes Gently into the SILENTNIGHT
Black Basta QakBot sRDI SystemBC Zloader UNC4393