Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-07-22Cyber ShafaratTreadstone 71
Hacking group Anonymous KSA, a notorious threat actor, is targeting India in a series of cyber attacks
Anonymous KSA
2024-07-21Cert-UACert-UA
UAC-0063 Attacks Research Institutions of Ukraine: HATVIBE + CHERRYSPY + CVE-2024-23692 (CERT-UA#10356)
HATVIBE
2024-07-18MandiantJared Wilson, Jonathan Lepore, Luis Rocha, Mike Stokkel, Pierre Gerlings, RENATO FONTANA, Stephen Eckels
APT41 Has Arisen From the DUST
Cobalt Strike
2024-07-17Huntress LabsAlden Schmidt, Greg Linares, Matt Anderson
Fake Browser Updates Lead to BOINC Volunteer Computing Software
FAKEUPDATES MintsLoader AsyncRAT
2024-07-16Sentinel LABSJim Walter
NullBulge | Threat Actor Masquerades as Hacktivist Group Rebelling Against AI
AsyncRAT LockBit XWorm Nullbulge
2024-07-16JPCERT/CCShusei Tomonaga
MirrorFace Attack against Japanese Organisations
LODEINFO NOOPDOOR
2024-07-15Objective-SeePatrick Wardle
This Meeting Should Have Been an Email: A DPRK stealer, dubbed BeaverTail, targets users via a trojanized meeting app
BeaverTail BeaverTail InvisibleFerret
2024-07-15SekoiaSekoia TDR
MuddyWater replaces Atera by custom MuddyRot implant in a recent campaign
bugsleep
2024-07-15Check PointCheckpoint Research
New BugSleep Backdoor Deployed in Recent MuddyWater Campaigns
bugsleep
2024-07-15ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Kematian Stealer Technical Malware Analysis
Kematian Stealer
2024-07-15TrendmicroAliakbar Zahravi, Peter Girnus
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
Void Banshee
2024-07-15Trend MicroAliakbar Zahravi, Peter Girnus
CVE-2024-38112: Void Banshee Targets Windows Users Through Zombie Internet Explorer in Zero-Day Attacks
2024-07-13cocomelonccocomelonc
Malware development: persistence - part 25. Create symlink from legit to evil. Simple C example.
2024-07-11Orange CyberdefenseSimon Vernin
R0BL0CH0N TDS: A deep dive into the infrastructure of an affiliate marketing scam
2024-07-11GoogleDianaE
Finding Malware: Detecting EMPTYSPACE with Google Security Operations
Vetta Loader
2024-07-11ZscalerSudeep Singh, Yin Hong Chang
MoonWalk: A deep dive into the updated arsenal of APT41 | Part 2
MoonWalk
2024-07-11sysdigMiguel Hernández
CRYSTALRAY: Inside the Operations of a Rising Threat Actor Exploiting OSS Tools
CRYSTALRAY
2024-07-11McAfeeVignesh Dhatchanamoorthy, Yashvi Shah
ClickFix Deception: A Social Engineering Tactic to Deploy Malware
DarkGate Lumma Stealer
2024-07-10ZscalerSudeep Singh, Yin Hong Chang
DodgeBox: A deep dive into the updated arsenal of APT41 | Part 1
Cobalt Strike DUSTPAN DUSTTRAP
2024-07-10Risky.bizCatalin Cimpanu
Risky Biz News: US takes down RT's Twitter bot farm
Lifting Zmiy