Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-08cocomelonccocomelonc
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples
2025-07-08AcronisAcronis Security
SafePay ransomware: the fast rising threat targeting MSPs
SafePay
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-07-06MalwareTraceJared G.
XWorm Part 2 - From Downloader to Config Extraction
XWorm
2025-07-04cocomelonccocomelonc
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples
2025-07-04QianxinRedDrip7
Exclusive disclosure of the attack activities of the APT group “NightEagle”
2025-07-03MalwareTraceJared G.
XWorm Part 1 - Unraveling a Steganography-Based Downloader
XWorm
2025-07-02CrowdStrikeCounter Adversary Operations
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
2025-07-02K7 SecuritySuresh Reddy
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?
AMOS
2025-07-01cocomelonccocomelonc
Malware development trick 48: leveraging Office macros for malware. Simple VBA example.
2025-07-01CERT-ILCERT-IL
DevMan Ransomware Threat Actor Report
DEVMAN
2025-07-01SpyCloudSpyCloud Labs Research Team
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry
2025-06-30MicrosoftMicrosoft Threat Intelligence
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-25cocomelonccocomelonc
MacOS hacking part 3: shellcoding. x86_64 assembly intro. Simple NASM examples
2025-06-24SocketSocket
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
BeaverTail InvisibleFerret
2025-06-23GdataKarsten Hahn, Lance Go
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
EvilConwi
2025-06-23cocomelonccocomelonc
Linux hacking part 6: Linux kernel module with params. Simple C example
2025-06-21Cert-UACert-UA
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT
BEARDSHELL SLIMAGENT
2025-06-19Hunt.ioHunt.io
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
Cobalt Strike
2025-06-19Government of CanadaGovernment of Canada
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign