Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-06Medium SarvivaMalwareAnalystsarviya
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication
XWorm
2025-03-05CTM360CTM360
PlayPraetor Trojan
Remo
2025-03-05HUMANAdam Sell, Aviad Kaiserman, Gabi Cirlig, Inna Vasilyeva, Joao Marques, João Santos, Lindsay Kaye, Louisa Abel, Maor Elizen, Mikhail Venkov, Nico Agnese, Vikas Parthasarathy, Will Herbig
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes
BADBOX
2025-03-05Trend MicroTrendmicro
Water Ouroboros
Hunters International SharpRhino
2025-03-05eSentireSpence Hutchinson
Initial Takeaways from the Black Basta Chat Leaks
Black Basta Black Basta
2025-03-05CyberScoopTim Starks
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
2025-03-05MicrosoftMicrosoft Threat Intelligence
Silk Typhoon targeting IT supply chain
2025-03-04K7 SecurityArun Kumar S, Dhanush
Tracking Emmenhtal
Emmenhtal
2025-03-04Medium (A-poc)A-poc
Black Basta Leak Analysis
Black Basta Black Basta
2025-03-04c/sideHimanshu Anand
Thousands of websites hit by four backdoors in 3rd party JavaScript attack
2025-03-04GeniansGenians
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack
Quasar RAT
2025-03-04NisosNisos
Likely DPRK Network Backstops on GitHub, Targets Companies Globally
2025-03-04Department of JusticeU.S. Attorney's Office Southern District of New York
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government
2025-03-04Hunt.ioHunt.io
Exposing Russian EFF Impersonators: The Inside Story on Stealc & Pyramid C2
Pyramid Stealc
2025-03-04Github (prodaft)PRODAFT
Ragnar Loader Indicators of Compromise (IOC)
Unidentified 103 (FIN8)
2025-03-04LinkedIn (Idan Tarab)Idan Tarab
Unmasking New Infrastructure: UAC-0184’s Espionage Activities
2025-03-04SecureworksSecureWorks
GOLD REBELLION
GOLD REBELLION
2025-03-03DeXposeM4lcode
PureLogs Deep Analysis: Evasion, Data Theft, and Encryption Mechanism
PureLogs Stealer
2025-03-03Trend MicroAdam O'Connor, Catherine Loveria, Gabriel Cardoso, Ian Kenefick, Jack Walsh, Jovit Samaniego, Lucas Silva, Stephen Carbery
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
Black Basta Black Basta Cactus ReedBed
2025-03-02ropgadget.comJeff White
Pivoting on Black Basta's (leaked) Infrastructure
Black Basta Black Basta