Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-05Kaspersky LabsSherif Magdy
Tropic Trooper spies on government entities in the Middle East
2024-09-05IntegoJoshua Long
New macOS malware HZ RAT gives attackers backdoor access to Macs
HZ RAT
2024-09-04HarfangLabAlice Climent-Pommeret
Unpacking the unpleasant FIN7 gift: PackXOR
r77 xmrig
2024-09-04Check PointCheck Point
Hacktivists Call for Release of Telegram Founder with #FreeDurov DDoS Campaign
EvilWeb RipperSec
2024-09-04CybershafaratTreadstone 71
Major IR leaks
IRLeaks
2024-09-04XLabAcey9, Alex.Turing, TF0xn
Uncovering DarkCracks: How a Stealthy Payload Delivery Framework Exploits GLPI and WordPress
DarkCracks
2024-09-04Trend MicroCedric Pernet, Jaromír Hořejší
Earth Lusca Uses KTLVdoor Backdoor for Multiplatform Intrusion
KTLVdoor KTLVdoor
2024-09-03K7 SecurityUma Madasamy
Luxy: A Stealer and a Ransomware in one
Luxy
2024-09-03DailyDarkWebDailyDarkWeb
LulzSec Black Claims Cyberattacks on Emirati Government and Other Sector Targets
LulzSec Black
2024-09-03Dr. WebDr.Web
Study of a targeted attack on a Russian rail freight operator
donut_injector
2024-09-03FortiGuard LabsPei Han Liao
Emansrepo Stealer: Multi-Vector Attack Chains
emansrepo
2024-09-03HackReadWAQAS
Hacker Leaks Data of 390 Million Users from VK, a Russian Social Network
HikkI-Chan
2024-09-03Hunt.ioHunt.io
ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
TONESHELL
2024-09-02Kaspersky LabsKaspersky
Head Mare: adventures of a unicorn in Russia and Belarus
PhantomCore Head Mare
2024-09-02cyjaxJake Keast
The Hacktivist Response to UK Foreign Policy
RipperSec
2024-09-01Ukrainska PravdaIvanna Kostina, KATERYNA TYSHCHENKO
German air traffic control suffered cyberattack, likely by pro-Russian group of hackers
2024-08-30TRUESECMattias Wåhlén, Nicklas Keijser
Dissecting the Cicada
Cicada3301
2024-08-30Denwp ResearchTonmoy Jitu
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages - Part 1
Lumma Stealer
2024-08-30MicrosoftMicrosoft Threat Intelligence
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
FudModule
2024-08-29NetskopeLeandro Froes
Latrodectus Rapid Evolution Continues With Latest New Payload Features
Latrodectus