Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-01-13SekoiaAmaury G., Erwan Chevalier, Félix Aime, Maxime A.
Double-Tap Campaign: Russia-nexus APT possibly related to APT28 conducts cyber espionage on Central Asia and Kazakhstan diplomatic relations
HATVIBE
2025-01-10Check Point ResearchCheck Point Research
FunkSec – Alleged Top Ransomware Group Powered by AI
FunkSec
2025-01-09The RecordDaryna Antoniuk
Hackers claim to breach Russian state agency managing property, land records
2025-01-09Recorded FutureInsikt Group
Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain
PlugX
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2025-01-07SOCRadarAmeer Onwa
Turla Cyber Campaign Targeting Pakistan’s Critical Infrastructure
2025-01-07Recorded FutureInsikt Group
Unveiling Russian Surveillance Tech Expansion in Central Asia and Latin America
2025-01-07Hunt.ioHunt.io
Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Cobalt Strike
2025-01-07SANS ISCYee Ching Tok
PacketCrypt Classic Cryptocurrency Miner on PHP Servers
2025-01-06North Korean InternetNick
Hangro: Investigating North Korean VPN Infrastructure Part 1
2025-01-06KasperskySaurabh Sharma, Vasily Berdnikov
EAGERBEE, with updated and novel components, targets the Middle East
EagerBee CoughingDown
2025-01-03Nimantha Deshappriya
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape)
AsyncRAT Quasar RAT Remcos
2024-12-31SOCRadarSOCRadar
Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc.
2024-12-28Medium s.lontzetidisEfstratios Lontzetidis
Lumma 2024: Dominating the Info-Stealer Market
Lumma Stealer
2024-12-26Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software
ComeBacker
2024-12-24LinkedIn (Idan Tarab)Idan Tarab
Under Siege: Sandworm's Fake Army+ App Threatens Ukraine’s Military Operations
2024-12-24NTT Security HoldingsNTT Security Holdings
Contagious Interview Uses New Malware Otter Cookie
BeaverTail OtterCookie InvisibleFerret
2024-12-23FBIDC3, FBI, NPA
FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com
2024-12-20Orange CyberdefenseAlexandre Matousek, Marine PICHON
Tweet on a variant of Emmenhtal
Emmenhtal
2024-12-19SPURSpur Engineering
Astrill VPN and DPRK Remote Worker Fraud