Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-01-07SOCRadarAmeer Onwa
Turla Cyber Campaign Targeting Pakistan’s Critical Infrastructure
2025-01-03Nimantha Deshappriya
RATs on the island (Remote Access Trojans in Sri Lanka's Cybersecurity Landscape)
AsyncRAT Quasar RAT Remcos
2024-12-31SOCRadarSOCRadar
Dark Web Profile: Gamaredon APT - SOCRadar® Cyber Intelligence Inc.
2024-12-30Medium TRAC LabsTRAC Labs
Advancing Through the Cyberfront, LegionLoader Commander
Satacom
2024-12-23FBIDC3, FBI, NPA
FBI, DC3, and NPA Identification of North Korean Cyber Actors, Tracked as TraderTraitor, Responsible for Theft of $308 Million USD from Bitcoin.DMM.com
2024-12-20Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v2
Emmenhtal
2024-12-18ClarotyTeam82
Inside a New Cyberweapon: IOCONTROL
elf.iocontrol
2024-12-18Kaspersky LabsKaspersky
Analysis of Cyber Anarchy Squad attacks targeting Russian and Belarusian organizations
Babuk LockBit Revenge RAT SparkRAT Cyber Alliance Ukrainian Cyber Alliance
2024-12-18KELAKELA’s Research Team
Three Months After the Storm: Did Cybercriminals Move to Telegram Alternatives?
2024-12-17CybereasonElena Odier, Gal Romano, Hema Loganathan, Ralph Villanueva
Your Data Is Under New Lummanagement: The Rise of LummaStealer
Lumma Stealer
2024-12-12Hunt.ioHunt.io
Oyster’s Trail: Resurgence of Infrastructure Linked to Ransomware and Cybercrime Actors
Broomstick
2024-12-12XLabXLab Team
Glutton: A New Zero-Detection PHP Backdoor from Winnti Targets Cybercrimals
Winnti Glutton
2024-12-10ClarotyTeam82
Inside a New OT/IoT Cyberweapon: IOCONTROL
elf.iocontrol
2024-12-07Cert-UACert-UA
Targeted cyberattacks UAC-0185 in relation to the Defense Forces and enterprises of defense systems of Ukraine (CRT-UA#12414)
UAC-0185
2024-12-05LinkedIn (Idan Tarab)Idan Tarab
The Diplomatic Deception: Patchwork’s Use of Fake U.S. Embassy Alerts in Cyber Espionage
2024-12-05Orange CyberdefenseAlexandre Matousek, Marine PICHON
Edam Dropper
Edam Emmenhtal
2024-11-26Reco AIGal Nakash
Stealth in the Cloud: How APT36's ElizaRAT is Redefining Cyber Espionage
ElizaRAT Operation C-Major
2024-11-25Trend MicroLenart Bermejo, Leon M Chang, Ted Lee, Theo Chen
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
MASOL SNAPPYBEE
2024-11-25LinkedIn (Idan Tarab)Idan Tarab
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield
2024-11-22MicrosoftMicrosoft Threat Intelligence
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Storm-2077