Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-01Reverse The MalwareDiyar Saadi
Threat Hunting with 20 Urlscan.io Search Queries
2025-08-01Reverse The MalwareDiyar Saadi
Feeds of Indicators Of Compromise ( TweetFeed )
2025-07-31MicrosoftMicrosoft Threat Intelligence
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
ApolloShadow
2025-07-31Reverse The MalwareDiyar Saadi
WhatChanged ? : A Digital Forensics and Incident Response Suite
2025-07-31Reverse The MalwareDiyar Saadi
ArtiFast Forensics Artifacts Investigation - ShellBags
2025-07-31Reverse The MalwareDiyar Saadi
ArtiFast Forensics Investigation - USB Forensics
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence Through NRD's ( New Registered Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via TLD's ( Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via GTLD's ( Generic Top Level Domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence visa ccTLD ( country code top-level domain )
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence ( Compromised domain list ) via ZoneFiles
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence via Newly Registered Domains
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence vis Domain Monitoring ( ccTLD , gTLD , TLD , Malware Zones )
2025-07-31Twitter (@Threatlabz)Zscaler
Tweet about new variant with BEEF instead of !RHA as config magic bytes
Rhadamanthys
2025-07-30RUSILouise Marie Hurel
What Singapore's First Public Cyber Attribution Tells Us
2025-07-28Kyiv IndependentMartin Fornusek
Hacker group claims responsibility for cyberattack on Russia's Aeroflot
2025-07-27Bleeping ComputerBill Toulas
Scattered Spider is running a VMware ESXi hacking spree
2025-07-27Medium RaghavtiResearchBeGoodToAll
Lumma Stealer — A Proliferating Threat in the Cybercrime Landscape
Lumma Stealer
2025-07-26Reverse The MalwareDiyar Saadi
User History Artifact : Practical Gathering of Artifacts
2025-07-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
The Operational Blueprint of Kimsuky APT for Cyber Espionage
Kimsuky