Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-13TEHTRISTEHTRIS
Cracking Formbook malware: Blind deobfuscation and quick response techniques
Formbook
2024-11-13BitdefenderMartin Zugec
ShrinkLocker (+Decryptor): From Friend to Foe, and Back Again
2024-11-12BlackberryBlackBerry Research & Intelligence Team
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
DEEPDATA
2024-11-12QianxinAlex Turing
New Zero-Detection Variant of Melofee Backdoor from Winnti Strikes RHEL 7.9
Melofee
2024-11-12SecurityScorecardRyan Sherstobitoff
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
2024-11-12DataBreaches.netDissent
Amazon confirms employee data breach after vendor hack
Nam3L3ss
2024-11-08Rostelecom-SolarSolar 4RAYS
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures
2024-11-08RedPacket SecurityRedPacket Security
[APT73] – Ransomware Victim: www[.]baldinger-ag[.]ch
APT73
2024-11-07Cisco TalosAliza Johnson, Chetan Raghuprasad, Elio Biasiotto, Michael Szeliga
Unwrapping the emerging Interlock ransomware attack
Rhysida
2024-11-07ESET ResearchESET Research
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey
FrostyNeighbor
2024-11-06CloudsekCloudsek
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave
Mozi
2024-11-06YouTube ( Hexacon)Clement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-11-06Kaspersky LabsKirill Korchemny
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
2024-11-05Hunt.ioHunt.io
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit
Running RAT
2024-11-04SecuronixDen Iyzvyk, Tim Peck
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging
Chisel
2024-11-01LevelBlueFernando Martinez
Ngioweb Remains Active 7 Years Later
Ngioweb
2024-10-31Twitter (@MonThreat)ThreatMon
Tweet about EvilByte claiming to have hacked MyFatoorah
Evilbyte
2024-10-31Sophos X-OpsRoss McKerchar
Pacific Rim: Inside the Counter-Offensive—The TTPs Used to Neutralize China-Based Threats
Asnarök
2024-10-31Sophos X-OpsAndrew Brandt, Ross McKerchar
Pacific Rim timeline: Information for defenders from a braid of interlocking attack campaigns
Asnarök Tstark
2024-10-31MicrosoftMicrosoft Threat Intelligence
Chinese threat actor Storm-0940 uses credentials from password spray attacks from a covert network
Storm-0940