Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-06-17CySecurity NewsCySecurity News
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum
Sp1d3r
2024-06-17Recorded FutureInsikt Group
The Travels of “markopolo”: Self-Proclaimed Meeting Software Vortax Spreads Infostealers, Unveils Expansive Network of Malicious macOS Applications
AMOS Rhadamanthys Stealc Markopolo
2024-06-17BitSightJoão Batista
Latrodectus are you coming back
Latrodectus
2024-06-17Rapid7Rapid7
Malvertising Campaign Leads to Execution of Oyster Backdoor
Broomstick ChrGetPdsi Stealer
2024-06-16cocomelonccocomelonc
Malware development trick 40: Stealing data via legit Telegram API. Simple C example.
2024-06-15Medium b.magnezi0xMrMagnezi
Malware Analysis FormBook
Formbook
2024-06-13Cisco TalosAsheer Malhotra, Gi7w0rm, Vitor Ventura
Operation Celestial Force employs mobile and desktop malware to target Indian entities
Gravity RAT Gravity RAT
2024-06-12SymantecSymantec Threat Hunter Team
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day
Black Basta UNC4393
2024-06-12The Cyber ExpressAshish Khaitan
Hack Alert: SN Blackmeta Claims Cyberattack on Snapchat Over Explicit Content and Alleged Political Bias!
Blackmeta
2024-06-12cocomelonccocomelonc
Malware development trick 39: Run payload via EnumDesktopsA. Simple Nim example.
2024-06-12ElasticDaniel Stepanic
Dipping into Danger: The WARMCOOKIE backdoor
WarmCookie
2024-06-12SymantecSymantec Threat Hunter Team
Ransomware Attackers May Have Used Privilege Escalation Vulnerability as Zero-day
Black Basta
2024-06-12GdataAnna Lvova, Karsten Hahn
New backdoor BadSpace delivered by high-ranking infected websites
WarmCookie
2024-06-11KrollGeorge Glass, Keith Wojcieszek, Laurie Iacono
PLAY Ransomware Group Gains Access via Citrix Bleed Vulnerability
PLAY
2024-06-11Invoke REJosh Reynolds
Parser Script for Havoc Config
Havoc
2024-06-11ZscalerThreatLabZ research team
A Brief History of SmokeLoader, Part 1
SmokeLoader
2024-06-10cybleCyble
Vietnamese Entities Targeted by China-Linked Mustang Panda in Cyber Espionage
2024-06-10MandiantMandiant
UNC5537 Targets Snowflake Customer Instances for Data Theft and Extortion
Lumma Stealer MetaStealer Raccoon RedLine Stealer RisePro Vidar UNC5537
2024-06-10The Hacker NewsRavie Lakshmanan
More_eggs Malware Disguised as Resumes Targets Recruiters in Phishing Attack
More_eggs
2024-06-07The RecordDaryna Antoniuk
Russia-linked Vermin hackers target Ukrainian military in new espionage campaign
UAC-0020