Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-01-15QianxinAcey9, Alex.Turing, Daji, wanghao
Zombies Never Die: Analysis of the Current Situation of Large Botnet AIRASHI
AIRASHI Aisuru kitty-socks5
2025-01-15CTFIOTCTFIOT
Article 113: One of the Russian-Ukrainian cyberwars, a review of the first major blackout in Ukraine caused by the Sandworm APT organization
KillDisk
2025-01-15HabrF.A.C.C.T. Information security
F.A.C.C.T. found new attacks of pro-Ukrainian cyber spies Sticky Werewolf
Ozone RAT
2025-01-150x0d4y0x0d4y
[BabbleLoader] A Deep Dive into EDR and Machine Learning-Based Endpoint Protection Evasion
2025-01-14VertexSavage
More Than Malware Families: Retooling Our Approach to Tracking Software
2025-01-14The RecordDaryna Antoniuk
Russia's largest platform for state procurement hit by cyberattack from pro-Ukraine group
2025-01-14RedSenseLandon Rice, Marley Smith, Yelisey Bohuslavskiy
From Royal to BlackSuit
BlackSuit Royal Ransom Royal Ransom BlackSuit Royal Ransom
2025-01-14Department of JusticeOffice of Public Affairs
Justice Department and FBI Conduct International Operation to Delete Malware Used by China-Backed Hackers
PlugX
2025-01-09The RecordDaryna Antoniuk
Hackers claim to breach Russian state agency managing property, land records
2025-01-08AcronisAcronis Security
TMPN (Skuld) Stealer: The dark side of open source
Skuld
2025-01-08CISO SeriesRich Stroffolino
Cyber Security News: Cyber Trust label, UK deepfake laws, Treasury attack details
Natohub
2025-01-07Hunt.ioHunt.io
Golang Beacons and VS Code Tunnels: Tracking a Cobalt Strike Server Leveraging Trusted Infrastructure
Cobalt Strike
2025-01-07SANS ISCYee Ching Tok
PacketCrypt Classic Cryptocurrency Miner on PHP Servers
2025-01-03Nimantha Deshappriya
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape)
AsyncRAT Quasar RAT Remcos
2024-12-30IntrinsecCTI Intrinsec
CryptBot: Hunting for initial access vectors
CryptBot Lumma Stealer PrivateLoader
2024-12-30Medium TRAC LabsTRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander
Satacom
2024-12-26Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software
ComeBacker
2024-12-23FBIDC3, FBI, NPA
FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com
2024-12-20Team CymruLewis Henderson
Jingle Shells: How Virtual Offices Enable a Facade of Legitimacy
2024-12-19SpyCloudJames
LummaC2 Revisited: What’s Making this Stealer Stealthier and More Lethal
GhostSocks Lumma Stealer