Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-20ReliaquestJohn Dilgen
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses
ReedBed
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor NailaoLocker PlugX ShadowPad
2025-02-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors
NailaoLocker PlugX ShadowPad
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-20ESET ResearchESET Research
DeceptiveDevelopment targets freelance developers
BeaverTail InvisibleFerret
2025-02-20Silent PushSilent Push
Tweet on Tracking ValleyRAT Domains with ICP Licenses
ValleyRAT
2025-02-20InfrawatchInfrawatch Research Team
GhostSocks - Lumma's Partner In Proxy
GhostSocks Lumma Stealer
2025-02-19PRODAFTPRODAFT
LARVA-208
BlackSuit RansomHub Larva-208
2025-02-19CISACISA
#StopRansomware: Ghost (Cring) Ransomware
Cring
2025-02-19Natto ThoughtsEugenio Benincasa
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network
2025-02-190x0d4y0x0d4y
Technical Analysis of Lockbit4.0 Evasion Tales
LockBit
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities
2025-02-18VaristKervin Alintanahin
Malvertisements, Fake Captchas and Infostealers
Lumma Stealer
2025-02-18Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
IOCs Green Nailao campaign (NailaoLocker, ShadowPad)
NailaoLocker PlugX ShadowPad
2025-02-18inversecosLina Lau
An inside look at NSA (Equation Group) TTPs from China’s lense
SECONDDATE
2025-02-18ProofpointProofpoint Threat Research Team
An Update on Fake Updates: Two New Actors, and New Mac Malware
Marcher FAKEUPDATES FrigidStealer Lumma Stealer
2025-02-15Medium TRAC LabsTRAC Labs
Don’t Ghost the SocGholish: GhostWeaver Backdoor
FAKEUPDATES
2025-02-15c-b.iocyb3rjerry
Dissecting a fresh BlankGrabber sample
BlankGrabber
2025-02-14Twitter (@DTCERT)Deutsche Telekom CERT
Twitter Thread on a password-protected loader observed in a vishing campaign
Unidentified 120
2025-02-13SecuronixDen Iyzvyk, Tim Peck
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
RandomQuery