Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-09-22Palo Alto Networks Unit 42Lior Rochberger, Robert Falcone, Tom Fakterman
Persistent Attempts at Cyberespionage Against Southeast Asian Government Target Have Links to Alloy Taurus
Reshell GALLIUM
2023-09-21Sentinel LABSTom Hegel
Cyber Soft Power | China’s Continental Takeover
Earth Estries
2023-09-06BitdefenderGraham Clueley
Pizza Hut Australia leaks one million customers' details, claims ShinyHunters hacking group
ShinyHunters
2023-09-06MalwarebytesJérôme Segura
Mac users targeted in new malvertising campaign delivering Atomic Stealer
AMOS NetSupportManager RAT
2023-09-05MorphisecArnold Osipov, Hido Cohen
Chae$ 4: New Chaes Malware Variant Targeting Financial and Logistics Customers
Chaes
2023-09-05MorphisecArnold Osipov, Hido Cohen
Chae$ 4: New Chaes Malware Variant Targeting Financial and Logistics Customers
Chaes
2023-08-31Checkpointhasherezade
From Hidden Bee to Rhadamanthys - The Evolution of Custom Executable Formats
Hidden Bee Rhadamanthys
2023-08-17SentinelOneAleksandar Milenkoski, Tom Hegel
Chinese Entanglement | DLL Hijacking in the Asian Gambling Sector
Cobalt Strike HUI Loader BRONZE STARLIGHT
2023-08-07Cisco TalosChetan Raghuprasad
New threat actor targets Bulgaria, China, Vietnam and other countries with customized Yashma ransomware
Chaos
2023-08-07SentinelOneAleksandar Milenkoski, Tom Hegel
Comrades in Arms? | North Korea Compromises Sanctioned Russian Missile Engineering Company
OpenCarrot
2023-08-01SentinelOneTom Hegel
Illicit Brand Impersonation | A Threat Hunting Approach
2023-07-20SentinelOneTom Hegel
JumpCloud Intrusion | Attacker Infrastructure Links Compromise to North Korean APT Activity
2023-07-12sekoia
CustomerLoader: a new malware distributing a wide variety of payloads
CustomerLoader
2023-07-12DragosDragos
Mitigating CVE-2023-3595 and CVE-2023-3596 Impacting Rockwell Automation ControlLogix Firmware
2023-05-17ANY.RUNANY.RUN
Deobfuscating the Latest GuLoader: Automating Analysis with Ghidra Scripting
CloudEyE
2023-05-16Check Point ResearchItay Cohen, Radoslaw Madej
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant
Horse Shell Camaro Dragon
2023-05-16Check Point ResearchItay Cohen, Radoslaw Madej
The Dragon Who Sold his Camaro: Analyzing a Custom Router Implant
Horse Shell Camaro Dragon
2023-05-15SymantecThreat Hunter Team
Lancefly: Group Uses Custom Backdoor to Target Orgs in Government, Aviation, Other Sectors
Merdoor PlugX ShadowPad ZXShell Lancefly
2023-05-12YouTube (BSides Prishtina)Egxona Ferati, META
Automating Threat Detection and Response at Scale - Egxona Ferati
2023-05-12YouTube (BSides Prishtina)Egxona Ferati, META
Automating Threat Detection and Response at Scale - Egxona Ferati