Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-02MicrosoftClint Watts
How Russia is trying to disrupt the 2024 Paris Olympic Games
Storm-1679
2024-05-31TEHTRISTEHTRIS
Ransomware spotted in active development phase: a successful early detection operation
CashRansomware
2024-05-31Cybersecurity InsidersBogdan Glushko
Proven Data Restores PowerHost’s VMware Backups After SEXi Ransomware Attack
SEXi SEXi
2024-05-30Trend MicroSunil Bharti
Decoding Water Sigbin's Latest Obfuscation Tricks
Water Sigbin
2024-05-30AkamaiMaxim Zavodchik, Ryan Barnett, Stiv Kupchik
RedTail Cryptominer Threat Actors Adopt PAN-OS CVE-2024-3400 Exploit
RedTail
2024-05-30EuropolEuropol
Largest ever operation against botnets hits dropper malware ecosystem
BumbleBee IcedID SmokeLoader SystemBC TrickBot
2024-05-30circleidWhoisXML API
A DNS Investigation of the Phobos Ransomware 8Base Attack
8Base Phobos
2024-05-29Medium (DoingFedTime)DoingFedTime
80-000 records exposed in shell data breach by threat actor
Threat Actor 888
2024-05-29eSentireeSentire
Fake Browser Updates delivering BitRAT and Lumma Stealer
BitRAT Lumma Stealer
2024-05-28HarfangLabHarfangLab CTR
AllaSenha: AllaKore variant leverages Azure cloud C2 to steal banking details in Latin America
AllaKore AllaSenha
2024-05-28MicrosoftMicrosoft Threat Intelligence
Moonstone Sleet emerges as new North Korean threat actor with new bag of tricks
splitloader
2024-05-28CyberSecurityNewsDhivya
Threats Claimimg Breach of Decathlon May 2024 Database
Threat Actor 888
2024-05-28ReliaquestRELIAQUEST THREAT RESEARCH TEAM
BlackSuit Attack Analysis
BlackSuit
2024-05-26ZW01fMohamed Ezat
QakBOT v5 Deep Malware Analysis
QakBot
2024-05-23ITOCHUITOCHU Cyber & Intelligence Inc.
Malware Transmutation! - Unveiling the Hidden Traces of BloodAlchemy
BloodAlchemy ShadowPad
2024-05-23Palo Alto Networks Unit 42Daniel Frank, Lior Rochberger
Operation Diplomatic Specter: An Active Chinese Cyberespionage Campaign Leverages Rare Tool Set to Target Governmental Entities in the Middle East, Africa and Asia
Agent Racoon CHINACHOPPER Ghost RAT JuicyPotato MimiKatz Ntospy PlugX SweetSpecter TunnelSpecter CL-STA-0043
2024-05-22Kaspersky LabsGReAT
Stealers, stealers and more stealers
2024-05-22Martin Zugec
Deep Dive Into Unfading Sea Haze: A New Threat Actor in the South China Sea
SilentGh0st
2024-05-21YoroiCarmelo Ragusa, Luigi Martire
Uncovering an undetected KeyPlug implant attacking industries in Italy
KEYPLUG
2024-05-21ElasticAndrew Pease, Salim Bitam, Samir Bousseaden, Terrance DeJesus
Invisible miners: unveiling GHOSTENGINE’s crypto mining operations
win.ghostengine