Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-20IntrinsecEquipe CTI
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot
2024-11-19ZscalerNikolaos Pantazopoulos
Unraveling Raspberry Robin's Layers: Analyzing Obfuscation Techniques and Core Mechanisms
Raspberry Robin Roshtyak
2024-11-19Trend MicroTrend Micro
Spot the Difference: Earth Kasha's New LODEINFO Campaign And The Correlation Analysis With The APT10 Umbrella
Cobalt Strike LODEINFO NOOPDOOR MirrorFace
2024-11-19Palo Alto Networks Unit 42Asher Davila, Chris Navarrete
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
FrostyGoop
2024-11-19CrowdStrikeCounter Adversary Operations
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector
LIMINAL PANDA
2024-11-19LumenBlack Lotus Labs
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet
Ngioweb Ngioweb
2024-11-18ProofpointProofpoint Threat Research Team, Selena Larson, Tommy Madjar
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
AsyncRAT Brute Ratel C4 DanaBot DarkGate Latrodectus Lumma Stealer NetSupportManager RAT XWorm
2024-11-18KrollDave Truman, George Glass
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER)
Carbanak HijackLoader
2024-11-18BlackberryBlackBerry Research and Intelligence team
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign
Sync-Scheduler
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb Water Barghest
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-15Information Security BuzzKirsten Doyle
Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector
TA455
2024-11-14Cisco TalosAlex Karkins, Chetan Raghuprasad, Joey Chen
New PXA Stealer targets government and education sectors for sensitive information
PXA Stealer
2024-11-14EclecticIQEclecticIQ Threat Research Team
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
SilkSpecter
2024-11-14cyjaxRoman Faithfull
An elephant in Kairos: data-leak site emerges for new extortion group
Kairos
2024-11-14Palo AltoUnit 42
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
BeaverTail InvisibleFerret WageMole
2024-11-13ClearSkyClearSky
New Zero-Day Vulnerability Detected: CVE-2024-43451
SparkRAT
2024-11-13ANY.RUNAaron Jornet Sales, ANY.RUN
HawkEye Malware: Technical Analysis
HawkEye Keylogger
2024-11-13SekoiaColine Chavane, Sekoia TDR
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats