Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-01-16MicrosoftMicrosoft Threat Intelligence
New Star Blizzard spear-phishing campaign targets WhatsApp accounts
2025-01-16eSentireeSentire Threat Response Unit (TRU)
MintsLoader: StealC and BOINC Delivery
MintsLoader Stealc
2025-01-16FortinetCarl Windsor
Analysis of Threat Actor Data Posting
Belsen Group
2025-01-10SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update July to December 2024
Coper FluBot Hook Mirai FAKEUPDATES AsyncRAT BianLian Brute Ratel C4 Cobalt Strike DanaBot DCRat Havoc Latrodectus NjRAT Quasar RAT RedLine Stealer Remcos Rhadamanthys Sliver Stealc
2025-01-08ThreatMonAlp Cihangir Aslan, Aziz Kaplan, Ozan Ünal, ThreatMon, ThreatMon Malware Research Team
Akira Ransomware Group & Malware Analysis Report
Akira
2024-12-26Weixin360 Threat Intelligence Center
Analysis of the attack activities of APT-C-26 (Lazarus) using weaponized IPMsg software
ComeBacker
2024-12-24LinkedIn (Idan Tarab)Idan Tarab
Under Siege: Sandworm's Fake Army+ App Threatens Ukraine’s Military Operations
2024-12-18eSentireeSentire Threat Response Unit (TRU)
Winos4.0 “Online Module” Staging Component Used in CleverSoar Campaign
ValleyRAT
2024-12-16ZscalerThreatLabZ research team
Technical Analysis of RiseLoader
RiseLoader
2024-12-11MicrosoftMicrosoft Threat Intelligence
Frequent freeloader part II: Russian actor Secret Blizzard using tools of other groups to attack Ukraine
Amadey Kazuar Wipbot FlyingYeti
2024-12-10ZscalerThreatLabZ research team
Inside Zloader’s Latest Trick: DNS Tunneling
GhostSocks Zloader
2024-12-04MicrosoftMicrosoft Threat Intelligence
Frequent freeloader part I: Secret Blizzard compromising Storm-0156 infrastructure for espionage
Crimson RAT MiniPocket TwoDash Wainscot Operation C-Major Storm-0473
2024-11-28Hunt.ioHunt.io
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
XWorm
2024-11-22MicrosoftMicrosoft Threat Intelligence
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Storm-2077
2024-11-20SPURSpur Engineering
The Threat of Residential Proxies to Sanctions Compliance
2024-11-19Australian Signals DirectorateASD
Annual Cyber Threat Report 2023-2024
2024-11-19CrowdStrikeCounter Adversary Operations
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector
LIMINAL PANDA
2024-11-18ProofpointProofpoint Threat Research Team, Selena Larson, Tommy Madjar
Security Brief: ClickFix Social Engineering Technique Floods Threat Landscape
AsyncRAT Brute Ratel C4 DanaBot DarkGate Latrodectus Lumma Stealer NetSupportManager RAT XWorm
2024-11-14EclecticIQEclecticIQ Threat Research Team
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
SilkSpecter
2024-11-13SekoiaColine Chavane, Sekoia TDR
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats