Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-24Palo Alto Networks Unit 42Alex Armstrong
Auto-Color: An Emerging and Evasive Linux Backdoor
2025-02-24EUR-LexOfficial Journal of the European Union
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24cocomelonccocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
OceanLotus DuQu StegoLoader
2025-02-24K7 SecuritySuresh Reddy
LCRYX Ransomware: How a VB Ransomware Locks Your System
LCRYX
2025-02-24Kaspersky LabsGeorgy Kucherin, João Godinho
The GitVenom campaign: cryptocurrency theft using GitHub
AsyncRAT Quasar RAT
2025-02-23The GuardianJoanna Partridge
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’
2025-02-22CrowdStrikeCrowdStrike
Curly Spider
UNC4393
2025-02-22CrowdStrikeCrowdStrike
Wandering Spider
Black Basta Black Basta GOLD REBELLION
2025-02-21Kaspersky LabsKaspersky
Angry Likho: Old beasts in a new forest
Lumma Stealer Angry Likho
2025-02-21TRM LabsTRM Insights
TRM Links North Korea to Record $1.5 Billion Record Hack
2025-02-21Twitter (@salmanvsf)Salman Shaikh
Tweet about VXPCrypter
2025-02-20ReliaquestJohn Dilgen
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses
ReedBed
2025-02-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors
NailaoLocker PlugX ShadowPad
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-20Silent PushSilent Push
Tweet on Tracking ValleyRAT Domains with ICP Licenses
ValleyRAT
2025-02-20InfrawatchInfrawatch Research Team
GhostSocks - Lumma's Partner In Proxy
GhostSocks Lumma Stealer
2025-02-19Natto ThoughtsEugenio Benincasa
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network
2025-02-190x0d4y0x0d4y
Technical Analysis of Lockbit4.0 Evasion Tales
LockBit
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities