Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24cocomelonccocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
OceanLotus DuQu StegoLoader
2025-02-23The GuardianJoanna Partridge
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’
2025-02-23Github (albertzsigovits)Albert Zsigovits
ToxicEye RAT config extraction and YARA signatures
ToxicEye
2025-02-21SonicWallSonicWall
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered
Remcos
2025-02-21TRM LabsTRM Insights
TRM Links North Korea to Record $1.5 Billion Record Hack
2025-02-20ReliaquestJohn Dilgen
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses
ReedBed
2025-02-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors
NailaoLocker PlugX ShadowPad
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-20Silent PushSilent Push
Tweet on Tracking ValleyRAT Domains with ICP Licenses
ValleyRAT
2025-02-18ProofpointProofpoint Threat Research Team
An Update on Fake Updates: Two New Actors, and New Mac Malware
Marcher FAKEUPDATES FrigidStealer Lumma Stealer
2025-02-15Medium TRAC LabsTRAC Labs
Don’t Ghost the SocGholish: GhostWeaver Backdoor
FAKEUPDATES
2025-02-13SecuronixDen Iyzvyk, Tim Peck
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
RandomQuery
2025-02-13SymantecThreat Hunter Team
China-linked Espionage Tools Used in Ransomware Attacks
PlugX
2025-02-13VolexityCharlie Gardner, Steven Adair, Tom Lancaster
Multiple Russian Threat Actors Targeting Microsoft Device Code Authentication
2025-02-12Hunt.ioHunt.io
Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Pyramid
2025-02-12DongaShin Gyu-jin
Suspected North Korean hacker hacks a large number of data from a government document system developer
2025-02-12cyber.wtf blogHendrik Eckardt, Leonard Rapp
Unpacking Pyarmor v8+ scripts
AsyncRAT DCRat XWorm
2025-02-12Red CanaryPhil Hagen, Tony Lambert
Defying tunneling: A Wicked approach to detecting malicious network traffic
AsyncRAT DCRat NjRAT XWorm
2025-02-12MicrosoftMicrosoft Threat Intelligence
The BadPilot campaign: Seashell Blizzard subgroup conducts multiyear global access operation
LocalOlive