Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-06AkamaiKyle Lefton
Here Comes Mirai: IoT Devices RSVP to Active Exploitation
LZRD
2025-05-06InfobloxInfoblox Threat Intelligence Group
Telegram Tango: Dancing with a Scammer
2025-05-06SentinelOneSentinelOne
Protection Against Local Upgrade Technique Described in Aon Research
2025-05-06NCSC SwitzerlandNCSC Switzerland
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II
2025-05-06MandiantMandiant
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
BlackCat DragonForce RansomHub
2025-05-06MandiantMandiant
Defending Against UNC3944: Cybercrime Hardening Guidance from the Frontlines
BlackCat DragonForce RansomHub
2025-05-06urlscan.iourlscan.io
Rise of Oriental Gudgeon
2025-05-05BleepingComputerLawrence Abrams
New "Bring Your Own Installer" EDR bypass used in ransomware attack
2025-05-05Hunt.ioHunt.io
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux
2025-05-05Security ChuSecurity Chu
Negotiations with the Akira ransomware group: an ill-advised approach
Akira Akira
2025-05-02Arctic WolfArctic Wolf Labs Team
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims
More_eggs
2025-05-02KrollDave Truman, George Glass, Marc Messer
Prelude: Crypto Heist Causes HAVOC
Havoc
2025-05-01FortinetFaisal Abdul Malik Qureshi, Fred Gutierrez, Hossein Jazi, John Simmons, Mark Robson, Said Wali, Xiaopeng Zhang
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure
Havoc
2025-05-01Recorded FutureInsikt Group, Insikt GroupĀ®
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
Terralogger
2025-05-01Recorded FutureInsikt Group
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
TerraStealer
2025-05-01Github (VenzoV)VenzoV
Deep Dive Fog ransomware
Fog
2025-05-01ZscalerThreatLabZ research team
I StealC You: Tracking the Rapid Changes To StealC
Stealc
2025-04-30SeqriteMahua Chakrabarthy, Sanjay Katkar
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government
Crimson RAT
2025-04-30Google Cloud CommunityPraveeth DSouza
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations
Lumma Stealer
2025-04-30MalwarebytesPieter Arntz
Fake Social Security Statement emails trick users into installing remote tool
Molatori