Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-28CyberSecurityNewsDhivya
Threats Claimimg Breach of Decathlon May 2024 Database
Threat Actor 888
2024-05-23Palo Alto Networks Unit 42Daniel Frank, Lior Rochberger
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia
Agent Racoon CHINACHOPPER Ghost RAT JuicyPotato MimiKatz Ntospy PlugX SweetSpecter TunnelSpecter CL-STA-0043
2024-05-22MandiantMichael Raggi
IOC Extinction? China-Nexus Cyber Espionage Actors Use ORB Networks to Raise Cost on Defenders
2024-05-09MeterpreterDDOS
Cybersecurity Firm Hacked: Sensitive Data on Sale
IntelBroker
2024-05-07GatewatcherGatewatcher
Cybercrime's Anatomy Threats to the Healthcare World
2024-05-06Cyber-ForensicsCyber-Forensics
Agent Tesla Malware Analysis
Agent Tesla
2024-05-04Medium MITRE-EngenuityLex Crumpton
Technical Deep Dive: Understanding the Anatomy of a Cyber Intrusion
WIREFIRE
2024-05-01MacnicaMacnica Networks
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023
LODEINFO NOOPDOOR
2024-05-01Trend MicroFeike Hacquebord, Fernando Mercês
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks
SSHDoor
2024-04-30IntrinsecIntrinsec
Matanbuchus & Co: Code Emulation and Cybercrime Infrastructure Discovery
FAKEUPDATES Matanbuchus
2024-04-29cyber5wcyber5w, M4lcode
How to unpack Death Ransomware
DeathRansom
2024-04-25MandiantJamie Collier, Kelli Vanderlee
Poll Vaulting: Cyber Threats to Global Elections
Callisto
2024-04-19Cert-UACert-UA
UAC-0133 (Sandworm) plans for cyber sabotage on almost 20 objects of critical infrastructure of Ukraine
Kapeka reGeorg
2024-04-19Medium MITRE-EngenuityCharles Clancy, Lex Crumpton
Advanced Cyber Threats Impact Even the Most Prepared
2024-04-18AvastLuigino Camastra
From BYOVD to a 0-day: Unveiling Advanced Exploits in Cyber Recruiting Scams
FudModule
2024-04-16HarfangLabCYBER THREAT RESEARCH TEAM
Analysis of the APT31 Indictment
RAWDOOR APT31
2024-04-13cyber5wcyber5w, M4lcode
Analysis of malicious Microsoft office macros
AsyncRAT Ave Maria
2024-04-07cyber5wM4lcode
Gafgyt Backdoor Analysis
Bashlite
2024-03-27EclecticIQArda Büyükkaya
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign
HackBrowserData
2024-03-21cyber5wM4lcode
CryptNet Ransomware Detailed Analysis
CryptNET