Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-15Positive TechnologiesAleksandr Badaev, Kseniya Naumova
SteganoAmor campaign: TA558 mass-attacking companies and public institutions all around the world
LokiBot 404 Keylogger Agent Tesla CloudEyE Formbook Remcos XWorm
2024-04-13cyber5wcyber5w, M4lcode
Analysis of malicious Microsoft office macros
AsyncRAT Ave Maria
2024-04-12Palo Alto Networks Unit 42Unit 42
Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400
UPSTYLE
2024-04-11MicrosoftMark Russinovich
How Microsoft discovers and mitigates evolving attacks against AI guardrails
2024-04-11paloalto Netoworks: Unit42paloalto Networks: Unit42
Contact Forms Campaign Pushes SSLoad Malware
SSLoad
2024-04-11Twitter (@embee_research)Embee_research
Tracking Malicious Infrastructure With DNS Records - Vultur Banking Trojan
Vultur
2024-04-102024-04-10Antonio Pirozzi, Sarthak Misraa
XZ Utils Backdoor | Threat Actor Planned to Inject Further Vulnerabilities
xzbot
2024-04-100ffset BlogDaniel Bunce
Resolving Stack Strings with Capstone Disassembler & Unicorn in Python
Conti
2024-04-10ESET ResearchLukáš Štefanko
eXotic Visit campaign: Tracing the footprints of Virtual Invaders
XploitSPY
2024-04-09Israel National Cyber DirectorateIsrael National Cyber Directorate
קבוצת התקיפה האיראנית Black Shadow
2024-04-09ClarotyTeam82
Unpacking the Blackjack Group's Fuxnet Malware
BlackJack
2024-04-09DCSODCSO CyTec
XZ Backdoor: How to check if your systems are affected
xzbot
2024-04-08GBHackers on SecurityDivya
Vedalia APT Group Exploits Oversized LNK Files to Deliver Malware
Opal Sleet
2024-04-07HackReadWAQAS
Hacker Leaks 8.5M U.S. Environmental Protection Agency (EPA) Contact Data (UPDATED)
USDoD
2024-04-07cyber5wM4lcode
Gafgyt Backdoor Analysis
Bashlite
2024-04-04Cisco TalosChetan Raghuprasad, Joey Chen
CoralRaider targets victims’ data and social media accounts
CoralRaider
2024-04-04The RecordDaryna Antoniuk
Hackers claim to breach database containing thousands of Russian criminal records
RGB-TEAM
2024-04-04Twitter (@BushidoToken)BushidoToken
Tweet about the SEXi Ransomware attack on IXMETRO POWERHOST
SEXi
2024-04-04MicrosoftClint Watts, Microsoft Threat Analysis Center (MTAC)
China tests US voter fault lines and ramps AI content to boost its geopolitical interests
2024-04-04Deep instinctSimon Kenin
DarkBeatC2: The Latest MuddyWater Attack Framework
MuddyC2Go