Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-26SentinelOneAleksandar Milenkoski, Julian-Ferdinand Vögele
ChamelGang & Friends | Cyberespionage Groups Attacking Critical Infrastructure with Ransomware
CatB Chamelgang
2024-06-25cocomelonccocomelonc
Malware development trick 41: Stealing data via legit VirusTotal API. Simple C example.
2024-06-24Recorded FutureInsikt Group
Chinese State-Sponsored RedJuliett Intensifies Taiwanese Cyber Espionage via Network Perimeter Exploitation
RedJuliett
2024-06-24CySecurity NewsCySecurity News
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code
IntelBroker
2024-06-24KrollDave Truman
Novel Technique Combination Used In IDATLOADER Distribution
Emmenhtal HijackLoader
2024-06-24SonicWallSonicWall
StrelaStealer Resurgence: Tracking a JavaScript-Driven Credential Stealer Targeting Europe
StrelaStealer
2024-06-21Cisco TalosAshley Shen, Chetan Raghuprasad
SneakyChef espionage group targets government agencies with SugarGh0st and more infection techniques
SneakyChef
2024-06-21Group-IBGroup-IB
Boolka Unveiled: From web attacks to modular malware
BMANAGER Boolka
2024-06-20Red CanaryThe Red Canary Team
Gourav Khandelwal, Akash Chaudhuri, Matthew Mesa, Sagar Patil, Uri Oren, Krithika Ramakrishnan
UNC4393
2024-06-20DARKReadingElizabeth Montalbano
'Vortax' Meeting Software Builds Elaborate Branding, Spreads Infostealers
Markopolo
2024-06-20SOCRadarSOCRadar
Dark Web Profile: SpaceBears
SpaceBears
2024-06-20cocomelonccocomelonc
Linux malware development 1: Intro to kernel hacking. Simple C example.
2024-06-19FortinetPei Han Liao
Fickle Stealer Distributed via Multiple Attack Chain
Fickle Stealer
2024-06-19Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi, Peter Girnus
Behind the Great Wall: Void Arachne Targets Chinese-Speaking Users With the Winos 4.0 C&C Framework
ValleyRAT Void Arachne
2024-06-19ANSSIANSSI
Malicious activities linked to the Nobelium intrusion set
WINELOADER
2024-06-19Joshua Penny, vc0RExor
Akira: The old-new style crime
Akira
2024-06-19BartBlaze, Nguyen Nguyen
New North Korean based backdoor packs a punch
NikiHTTP
2024-06-18MandiantMandiant
Cloaked and Covert: Uncovering UNC3886 Espionage Operations
2024-06-17splunkSplunk Threat Research Team
LNK or Swim: Analysis & Simulation of Recent LNK Phishing
2024-06-17CheckpointCheckpoint
17th June – Threat Intelligence Report
Sp1d3r UNC5537