Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-13Github (LambdaMamba)Lena Yu
Implementation of a Config Decryptor for Amadey
Amadey
2024-06-12The Cyber ExpressAshish Khaitan
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias!
Blackmeta
2024-06-11KrollGeorge Glass, Keith Wojcieszek, Laurie Iacono
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability
PLAY
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-05SekoiaCharles Meslay
The reverse engineering of malicious code in the ITC - Analysis of the evolution of a chain of infection (Slides)
FlowCloud
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-05-03Aqua NautilusAqua Nautilus
Kinsing Demystified: A Comprehensive Technical Guide
Kinsing
2024-05-01MicrosoftDimitrios Valsamaras
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
2024-04-22Security AffairsPierluigi Paganini
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities
GhostR
2024-04-19dissect.ingScottish Fold
Exploiting a cryptographic vulnerability inside the Donex Ransomware
Donex
2024-04-15UC Santa CruzAlonso Rojas, Alvaro A. Cardenas, Bing Huang, Emmanuele Zambon, Juan Lozano, Keerthi Koneru, Luis Salazar, Marina Krotofil, Ross Baldick, Sebastian R. Castro
A Tale of Two Industroyers: It was the Season of Darkness
Industroyer INDUSTROYER2
2024-03-29CISACISA
Reported Supply Chain Compromise Affecting XZ Utils Data Compression Library, CVE-2024-3094
xzbot
2024-03-11SOCRadarSOCRadar
Acuity Federal Contractor Breach, Okta Customers Leak, DCRat Exploit and Access Sales
DCRat CyberNiggers
2024-03-05Team CymruS2 Research Team
Coper / Octo - A Conductor for Mobile Mayhem… With Eight Limbs?
Coper
2024-03-01HarfangLabHarfangLab CTR
A Comprehensive Analysis of i-SOON’s Commercial Offering
ShadowPad Winnti
2024-02-26SpyCloudAshley Allocca, Kyla Cardona
“Pantsless Data”: Decoding Chinese Cybercrime TTPs
2024-02-26The DFIR ReportThe DFIR Report
SEO Poisoning to Domain Control: The Gootloader Saga Continues
GootLoader
2024-02-20TrendmicroPierre Lee, Sunny Lu
Earth Preta Campaign Uses DOPLUGS to Target Asia
DOPLUGS
2024-02-12Estrellas's BlogOtávio M.
Unveiling custom packers: A comprehensive guide
Dridex Simda
2024-02-09Department of JusticeOffice of Public Affairs
International Cybercrime Malware Service Dismantled by Federal Authorities: Key Malware Sales and Support Actors in Malta and Nigeria Charged in Federal Indictments
Ave Maria