Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-03FortiGuard LabsPei Han Liao
Emansrepo Stealer: Multi-Vector Attack Chains
emansrepo
2024-09-03HackReadWAQAS
Hacker Leaks Data of 390 Million Users from VK, a Russian Social Network
HikkI-Chan
2024-09-03Hunt.ioHunt.io
ToneShell Backdoor Used to Target Attendees of the IISS Defence Summit
TONESHELL
2024-09-03Twitter (@embee_research)Embee_research
Advanced Cyberchef Techniques - Defeating Nanocore Obfuscation With Math and Flow Control
Nanocore RAT
2024-09-02Kaspersky LabsKaspersky
Head Mare: adventures of a unicorn in Russia and Belarus
PhantomCore Head Mare
2024-09-02cyjaxJake Keast
The Hacktivist Response to UK Foreign Policy
RipperSec
2024-09-01Ukrainska PravdaIvanna Kostina, KATERYNA TYSHCHENKO
German air traffic control suffered cyberattack, likely by pro-Russian group of hackers
2024-09-01X (@naumovax)
Suspected PrivateLoader
Unidentified 118
2024-09-01Hunt.ioHunt.io
Echoes of Stargazer Goblin: Analyzing Shared TTPs from an Open Directory
Sliver
2024-08-30TRUESECMattias Wåhlén, Nicklas Keijser
Dissecting the Cicada
Cicada3301
2024-08-30Denwp ResearchTonmoy Jitu
Anatomy of a Lumma Stealer Attack via Fake CAPTCHA Pages - Part 1
Lumma Stealer
2024-08-30MicrosoftMicrosoft Threat Intelligence
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
FudModule
2024-08-29NetskopeLeandro Froes
Latrodectus Rapid Evolution Continues With Latest New Payload Features
Latrodectus
2024-08-29GoogleClement Lecigne, Josh Atkins, Luke Jenkins
State-backed attackers and commercial surveillance vendors repeatedly use the same exploits
ANDROSNATCH Unidentified APK 009 (Chrome Recon) COOKIESNATCH VALIDVICTOR
2024-08-29ProofpointPim Trouerbach, Selena Larson, Tommy Madjar
The Malware That Must Not Be Named: Suspected Espionage Campaign Delivers “Voldemort”
Voldemort
2024-08-29NetskopeLeandro Froes
Latrodectus Rapid Evolution Continues With Latest New Payload Features
Latrodectus
2024-08-29SecuronixDen Iyzvyk, Tim Peck
From Cobalt Strike to Mimikatz: A Deep Dive into the SLOW#TEMPEST Campaign Targeting Chinese Users
Cobalt Strike MimiKatz
2024-08-29Hunt.ioHunt.io
Latrodectus Malware Masquerades as AhnLab Security Software to Infect Victims
Latrodectus
2024-08-28Bleeping ComputerBill Toulas
PoorTry Windows driver evolves into a full-featured EDR wiper
POORTRY
2024-08-28ESET ResearchRomain Dumont
Analysis of two arbitrary code execution vulnerabilities affecting WPS Office
SpyGrace