Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-13Intel 471Intel 471
Threat hunting case study: SocGholish
FAKEUPDATES
2025-02-13SymantecThreat Hunter Team
China-linked Espionage Tools Used in Ransomware Attacks
PlugX
2025-02-13Recorded FutureRecorded Future
Inside the Scam: North Korea’s IT Worker Threat
BeaverTail OtterCookie InvisibleFerret
2025-02-13MicrosoftMicrosoft Threat Intelligence
Storm-2372 conducts device code phishing campaign
Storm-2372
2025-02-13VolexityCharlie Gardner, Steven Adair, Tom Lancaster
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
2025-02-13Recorded FutureInsikt Group
RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers
GhostEmperor
2025-02-12cybleCyble
BTMOB RAT: Newly Discovered Android Malware Spreading via Phishing Sites
BTMOB RAT
2025-02-12Hunt.ioHunt.io
Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Pyramid
2025-02-12DongaShin Gyu-jin
Suspected North Korean hacker hacks a large number of data from a government document system developer
2025-02-12MicrosoftMicrosoft Threat Intelligence
The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation
LocalOlive
2025-02-12Bleeping ComputerBill Toulas
Surge in attacks exploiting old ThinkPHP and ownCloud flaws
2025-02-12The Hacker NewsRavie Lakshmanan
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
2025-02-11SekoiaPierre Le Bourhis
RATatouille: Cooking Up Chaos in the I2P Kitchen
Unidentified 118
2025-02-11EclecticIQArda Büyükkaya
Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
Kalambur BACKORDER DCRat
2025-02-11Twitter (@MsftSecIntel)Microsoft Threat Intelligence
Twitter Thread on a new Kimsuky tactic inciting admins to paste powershell
2025-02-10HarfangLabHarfangLab CTR
Further insights into Ivanti CSA 4.6 vulnerabilities exploitation
Godzilla Webshell Behinder
2025-02-09Medium (@mvaks)mvaks
Analysis of malicious mobile applications impersonating popular Polish apps — OLX, Allegro, IKO
SpyNote TrickMo
2025-02-06MicrosoftMicrosoft Threat Intelligence
Code injection attacks using publicly disclosed ASP.NET machine keys
2025-02-05cybleCyble
Stealthy Attack: Dual Injection Undermines Chrome’s App-Bound Encryption
2025-02-05BitdefenderAlina Bizga, Andrei ANTON-AANEI
Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam
tsunami