Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-27SonicWallSecurity News
AutoIT Bot Targets Gmail Accounts First
2024-08-22NTT SecurityRintaro Koike, Ryu Hiyoshi
Attacks by malware abusing AppDomainManager Injection
2024-08-15Roy Darnell
Beyond the Hype: Unveiling the Realities of WormGPT in Cybersecurity
2024-08-15ElasticElastic Security Labs
Beyond the wail: deconstructing the BANSHEE infostealer
BANSHEE
2024-08-13GoogleGoogle
Finding Malware: Unveiling NUMOZYLOD with Google Security Operations
EugenLoader UNC4536
2024-07-26SecurityIntelligenceGolo Mühr, Joe Fasulo
Hive0137 and AI-supplemented malware distribution
WarmCookie XWorm Hive0137
2024-07-23K7 SecurityDhanush
Threat actors target recent Election Results
Crimson RAT
2024-07-11GoogleDianaE
Finding Malware: Detecting EMPTYSPACE with Google Security Operations
Vetta Loader
2024-07-02K7 SecurityArunkumar
Kematian Stealer forked from PowerShell Token Grabber
Kematian Stealer
2024-06-25Cado SecurityNate Bill
From Dormant to Dangerous: P2Pinfect Evolves to Deploy New Ransomware and Cryptominer
P2Pinfect
2024-06-24CySecurity NewsCySecurity News
Infamous Hacker IntelBroker Breaches Apple's Security, Leaks Internal Tool Source Code
IntelBroker
2024-06-17CySecurity NewsCySecurity News
Truist Bank Confirms Data Breach After Information Surfaces on Hacking Forum
Sp1d3r
2024-06-13IT Security GuruGuru
Guest Blog: Ox Security on learning from the Recent GitHub Extortion Campaigns
Gitloker
2024-06-07SOCRadarSOCRadar
Grandoreiro Malware Campaign: A Global Threat to Banking Security
Grandoreiro
2024-06-07Security AffairsPierluigi Paganini
Pandabuy was extorted twice by the same Threat Actor
IntelBroker
2024-06-05QuoIntelligenceAlixia Clarisse Rutayisire
European Election Security At Risk: A Detailed Analysis of State-Sponsored, eCrime, and Hacktivist Threats
Dragonbridge
2024-06-03Securite360.netMuffin
Unveiling Sharp Panda’s New Loader
2024-05-31Cybersecurity InsidersBogdan Glushko
Proven Data Restores PowerHost’s VMware Backups After SEXi Ransomware Attack
SEXi SEXi
2024-05-28CyberSecurityNewsDhivya
Threats Claimimg Breach of Decathlon May 2024 Database
Threat Actor 888
2024-05-24KrebsOnSecurityBrian Krebs
Stark Industries Solutions: An Iron Hammer in the Cloud