Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-08Trend MicroLenart Bermejo, Leon M Chang, Ted Lee
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
2024-11-08Rostelecom-SolarSolar 4RAYS
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures
2024-11-08RedPacket SecurityRedPacket Security
[APT73] – Ransomware Victim: www[.]baldinger-ag[.]ch
APT73
2024-11-07Cisco TalosAliza Johnson, Chetan Raghuprasad, Elio Biasiotto, Michael Szeliga
Unwrapping the emerging Interlock ransomware attack
Rhysida
2024-11-07ESET ResearchESET Research
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey
FrostyNeighbor
2024-11-07Perception PointArthur Vaiselbuh
Evasive ZIP Concatenation: Trojan Targets Windows Users
SmokeLoader
2024-11-07LogpointAnish Bogati
Hiding in Plain Sight: The Subtle Art of Loki Malware’s Obfuscation
Loki Password Stealer (PWS)
2024-11-07nimanthadeshappriya.comNimantha Deshappriya
SideWinder’s ( T-APT-04 ) Sri Lanka Adventure
2024-11-06SophosAsha Castle, Hikaru Koike, Sean Gallagher, Trang Tang
Bengal cat lovers in Australia get psspsspss’d in Google-driven Gootloader campaign
GootLoader
2024-11-06CloudsekCloudsek
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave
Mozi
2024-11-06YouTube ( Hexacon)Clement Lecigne, Google Threat Analysis Group
Caught in the wild - Past, present and future
2024-11-06Check Point ResearchCheck Point Research
CopyRh(ight)adamantys Campaign: Rhadamantys Exploits Intellectual Property Infringement Baits
Rhadamanthys
2024-11-06Kaspersky LabsKirill Korchemny
New SteelFox Trojan mimics software activators, stealing sensitive data and mining cryptocurrency
2024-11-05Hunt.ioHunt.io
RunningRAT’s Next Move: From Remote Access to Crypto Mining for Profit
Running RAT
2024-11-04Israel National Cyber Directorate (INCD)Israel National Cyber Directorate (INCD)
Deep Drive Analysis of the BeaverTail Infostealer
BeaverTail
2024-11-04Medium (@DCSO_CyTec)Denis Szadkowski, Johann Aydinbas, Maike Orlikowski, Paul van Ramesdonk
Unransomware: From Zero to Full Recovery in a Blink
Akira
2024-11-04CleafyAlessandro Strino, Federico Valentini, Michele Roviello
ToxicPanda: a new banking trojan from Asia hit Europe and LATAM
ToxicPanda
2024-11-04SecuronixDen Iyzvyk, Tim Peck
CRON#TRAP: Emulated Linux Environments as the Latest Tactic in Malware Staging
Chisel
2024-11-04ZscalerZscaler
From Pyongyang to Your Payroll: The Rise of North Korean Remote Workers in the West
BeaverTail InvisibleFerret WageMole
2024-11-01LevelBlueFernando Martinez
Ngioweb Remains Active 7 Years Later
Ngioweb