Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-02ropgadget.comJeff White
Pivoting on Black Basta's (leaked) Infrastructure
Black Basta Black Basta
2025-03-01LeMagITValéry Rieß-Marchive
Ransomware : de REvil à Black Basta, que sait-on de Tramp ?
Black Basta Black Basta
2025-02-28Intel 471Intel 471
Black Basta exposed: A look at a cybercrime data leak
Black Basta Black Basta
2025-02-28GreynoiseNoah Stone
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran
Mirai
2025-02-28Palo Alto Networks Unit 42Margaret Kelley
JavaGhost’s Persistent Phishing Attacks From the Cloud
JavaGhost
2025-02-27BushidoTokenwilliam thomas
BlackBasta Leaks: Lessons from the Ascension Health attack
Black Basta
2025-02-27SC MediaSC Staff
Over 600 organizations subjected to global EncryptHub attacks
Larva-208
2025-02-27AhnLabASEC
Phishing Email Attacks by the Larva-24005 Group Targeting Japan
Larva-24005
2025-02-27QianxinAcey9, Alex Turing, heziqian, wanghao
Long Live The Vo1d Botnet: New Variant Hits 1.6 Million TV Globally
vo1d
2025-02-27Palo Alto Networks Unit 42Lior Rochberger, Tom Fakterman
Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations
FINALDRAFT FINALDRAFT
2025-02-27Check Point ResearchItay Cohen
Modern Approach to Attributing Hacktivist Groups
2025-02-26OntinueBalazs Greksza, Domenico de Vitto, Manupriya Sharma, Rhys Downing
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations
Black Basta Black Basta
2025-02-26ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
FOG Ransomware Attacks the Energy Sector in Turkey
STOP
2025-02-26FBIIC3
Alert Number: I-022625-PSA - North Korea Responsible for $1.5 Billion Bybit Hack
2025-02-26POLITICOAntoaneta Roussi
Chinese hackers siphoned off Belgian state security emails, report says
2025-02-24Palo Alto Networks Unit 42Alex Armstrong
Auto-Color: An Emerging and Evasive Linux Backdoor
2025-02-24EUR-LexOfficial Journal of the European Union
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24cocomelonccocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
OceanLotus DuQu StegoLoader
2025-02-23The GuardianJoanna Partridge
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’