Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities
2025-02-11Github (SecurityBlueTeam)Security Blue Team
Smartloader Wireshark plugin
SmartLoader
2025-02-11CyberSecurityNewsDo Son
Sandworm APT Exploits Trojanized KMS Tools to Target Ukrainian Users in Cyber Espionage Campaign
DCRat
2025-01-29SecurityScorecardSecurityScorecard STRIKE Team
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
BeaverTail InvisibleFerret
2025-01-27SecurityScorecardSTRIKE Team
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
2025-01-21Financial Security InstituteJeongGak Lyu
Follow the Clues - Everyday is lazarus.day
2025-01-17Google Cloud SecurityOffice of the CISO
Threat Horizons - H1 2025 Threat Horizons Report
FAKEUPDATES Conti Hades LockBit Phoenix Locker RansomHub TRIPLESTRENGTH
2025-01-15HabrF.A.C.C.T. Information security
F.A.C.C.T. found new attacks of pro-Ukrainian cyber spies Sticky Werewolf
Ozone RAT
2025-01-08AcronisAcronis Security
TMPN (Skuld) Stealer: The dark side of open source
Skuld
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2025-01-03Nimantha Deshappriya
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape)
AsyncRAT Quasar RAT Remcos
2024-12-24NTT Security HoldingsNTT Security Holdings
Contagious Interview Uses New Malware Otter Cookie
BeaverTail OtterCookie InvisibleFerret
2024-12-14Axel's IT Security ResearchAxel Mahr
How to Identify XenoRAT C2 Servers
XenoRAT
2024-12-12ElasticDaniel Stepanic, Elastic Security Labs, Jia Yu Chan, Salim Bitam, Seth Goodwin
Under the SADBRIDGE with GOSAR: QUASAR Gets a Golang Rewrite
Gosar Quasar RAT SADBRIDGE
2024-12-11LookoutKristina Balaam
Lookout Discovers New Chinese Surveillance Tool Used by Public Security Bureaus
EagleMsgSpy
2024-12-11SublimeSublime Security
Xloader deep dive: Link-based malware delivery via SharePoint impersonation
Xloader Formbook
2024-12-02TechSpotAlfonso Maruccia
Hacking group claims to have cracked Microsoft's software licensing security on a massive scale
Massgrave
2024-11-26Security IntelligenceNir Somech
What’s up India? PixPirate is back and spreading via WhatsApp
PixPirate
2024-11-26Security AffairsPierluigi Paganini
The source code of Banshee Stealer leaked online
BANSHEE
2024-11-18ProofpointProofpoint Threat Research Team, Selena Larson, Tommy Madjar
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
AsyncRAT Brute Ratel C4 DanaBot DarkGate Latrodectus Lumma Stealer NetSupportManager RAT XWorm