Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-11-21Medium infoSec Write-upsJustAnother-Engineer
Unmasking NJRat: A Deep Dive into a Notorious Remote Access Trojan Part1
NjRAT
2023-11-21adluminadlumin
PlayCrypt Ransomware-as-a-Service Expands Threat from Script Kiddies and Sophisticated Attackers
PLAY
2023-11-20PWCSveva Vittoria Scenarelli
King of Thieves: Black Alicanto and the Ecosystem of North Korea-Based Cyber Operations
RustBucket CageyChameleon RustBucket
2023-11-20Trend MicroPeter Girnus
CVE-2023-46604 (Apache ActiveMQ) Exploited to Infect Systems With Cryptominers and Rootkits
2023-11-20Outpost24Alberto Marín
Unveiling LummaC2 stealer’s novel Anti-Sandbox technique: Leveraging trigonometry for human behavior detection
Lumma Stealer
2023-11-19OALabsOALabs
PikaBot Is Back With a Vengeance - Part 2
Pikabot
2023-11-17Cisco TalosGuilherme Venere
Understanding the Phobos affiliate structure and activity
Phobos
2023-11-16Medium g0njxag0njxa
Approaching stealers devs : a brief interview with LummaC2
Lumma Stealer
2023-11-16The RegisterConnor Jones
BlackCat plays with malvertising traps to lure corporate victims
BlackCat
2023-11-16YouTube (Swiss Cyber Storm)Angelo Violetti
Resilience Rising: Countering the Threat Actors Behind Black Basta Ransomware
Black Basta
2023-11-14LumenBlack Lotus Labs
Taking The Elevator Down To Ring 0
Elevator
2023-11-14SOC PrimeVeronika Telychko
Remcos RAT Detection: UAC-0050 Hackers Launch Phishing Attacks Impersonating the Security Service of Ukraine
Remcos UAC-0050
2023-11-14National Security and Defense Council of UkraineOrganization of the National Security and Defense Council of Ukraine
APT29 attacks Embassies using CVE-2023-38831
2023-11-14SektorCERTSektorCERT
The Attacks against the Danish Critical Infrastructure (translated)
2023-11-14SektorCERTSektorCERT
The Attacks against the Danish Critical Infrastructure
2023-11-12OALabsOALabs
PikaBot Is Back With a Vengeance
Pikabot
2023-11-10BlackberryDmitry Bestuzhev
BiBi Wiper Used in the Israel-Hamas War Now Runs on Windows
BiBi
2023-11-10AhnLabASEC Analysis Team
Detection of attacks exploiting asset management software (Andariel Group)
Lilith Tiger RAT
2023-11-09MandiantChris Sistrunk, Daniel Kapellmann Zafra, Jared Wilson, John Wolfram, Keith Lunden, Ken Proska, Nathan Brubaker, Tyler McLellan
Sandworm Disrupts Power in Ukraine Using a Novel Attack Against Operational Technology
CaddyWiper
2023-11-09SOC PrimeDaryna Olyniychuk
Agonizing Serpens Attack Detection: Iran-Backed Hackers Target Israeli Tech Firms and Educational Institutions
Pink Sandstorm