Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-05Security ChuSecurity Chu
Negotiations with the Akira ransomware group: an ill-advised approach
Akira Akira
2025-05-02KrollDave Truman, George Glass, Marc Messer
Prelude: Crypto Heist Causes HAVOC
Havoc
2025-05-01FortinetFaisal Abdul Malik Qureshi, Fred Gutierrez, Hossein Jazi, John Simmons, Mark Robson, Said Wali, Xiaopeng Zhang
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure
Havoc
2025-05-01Recorded FutureInsikt Group, Insikt Group®
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
Terralogger
2025-05-01Recorded FutureInsikt Group
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
TerraStealer
2025-05-01ZscalerThreatLabZ research team
I StealC You: Tracking the Rapid Changes To StealC
Stealc
2025-04-30SeqriteMahua Chakrabarthy, Sanjay Katkar
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government
Crimson RAT
2025-04-30MalwarebytesPieter Arntz
Fake Social Security Statement emails trick users into installing remote tool
Molatori
2025-04-30ZAYOTEMTamer Burak Telseren
Oski Stealer Technical Analysis Report 2025
Oski Stealer
2025-04-29paloalto Netoworks: Unit42Benjamin Chang, Pranay Kumar Chhaparwal
Gremlin Stealer: New Stealer on Sale in Underground Forum
Gremlin
2025-04-29Nextron SystemsMaurice Fielenbach
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements”
Cobalt Strike Nitrogen Loader
2025-04-29France DiplomatieFrance Diplomatie
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025)
2025-04-29TrustwaveTrustwave SpiderLabs
Yet Another NodeJS Backdoor (YaNB): A Modern Challenge
KongTuke
2025-04-29Recorded FutureInsikt Group
Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting
FAKEUPDATES MintsLoader GhostWeaver Stealc TAG-124
2025-04-29LinkedIn (Ethical Hackers Academy)Ethical Hackers Academy
RansomHub Ransomware Deploys Malware to Breach Corporate Networks
FAKEUPDATES RansomHub
2025-04-28SentinelOneAleksandar Milenkoski, Jim Walter, Tom Hegel
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
PurpleHaze
2025-04-28InfobloxDarby Wise, Laura da Rocha, Piotr Glaska
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams
Reckless Rabbit Ruthless Rabbit
2025-04-28NetresecErik Hjelmvik
Decoding njRAT traffic with NetworkMiner
NjRAT
2025-04-25Trend MicroNick Dai, Sunny Lu
Earth Kurma APT Campaign Targets Southeast Asian Government, Telecom Sectors
KRNRAT Moriya Earth Kurma
2025-04-25HiSolutionsMaik Würth, Mateo Mrvelj, Nicolas Sprenger
Rolling in the Deep(Web): Lazarus Tsunami
tsunami