Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-22DragosJosh Hanrahan
VOLTZITE Espionage Operations Targeting U.S. Critical Systems
2024-02-22SekoiaLivia Tibirna, Pierre-Antoine D., Quentin Bourgue, Threat & Detection Research Team
Scattered Spider laying new eggs
BlackCat
2024-02-22UptycsUptycs Threat Research
8220 Gang Cryptomining Campaign Targets Linux & Windows Platforms
Water Sigbin
2024-02-22SPURSean S.
CloudRouter: 911 Proxy Resurrected
2024-02-22Medium b.magnezi0xMrMagnezi
Malware Analysis - XWorm
XWorm
2024-02-22SentinelOneAleksandar Milenkoski
Doppelgänger | Russia-Aligned Influence Operation Targets Germany
2024-02-21Invoke REJosh Reynolds
Automating Qakbot Malware Analysis with Binary Ninja
QakBot
2024-02-21YouTube (SentinelOne)Kris McConkey
LABSCon23 Replay | Chasing Shadows | The rise of a prolific espionage actor
9002 RAT PlugX ShadowPad Spyder Earth Lusca
2024-02-21CrowdStrikeCrowdStrike
CrowdStrike Global Threat Report 2024
2024-02-21POLITICOAntoaneta Roussi
Brussels spyware bombshell: Surveillance software found on officials’ phones
2024-02-21Medium b.magnezi0xMrMagnezi
Malware Analysis — Remcos RAT
Remcos
2024-02-21CleafyFrancesco Iubatti
A stealthy threat uncovered: TeaBot on Google Play Store
Anatsa
2024-02-21DCSOJiro Minier, Johann Aydinbas, Kritika Roy, Olivia Hayward
To Russia With Love: Assessing a KONNI-Backdoored Suspected Russian Consular Software Installer
Konni
2024-02-21YouTube (Invoke RE)Josh Reynolds
Analyzing Qakbot Using Binary Ninja Automation Part 3
QakBot
2024-02-20ANY.RUNJack Zalesskiy
Understanding Macros in Malware: Types, Capabilities, Case Study
2024-02-20TrendmicroPierre Lee, Sunny Lu
Earth Preta Campaign Uses DOPLUGS to Target Asia
DOPLUGS
2024-02-20YouTube (Embee Research)Embee_research
StealC Loader Analysis - Decoding Powershell Malware With CyberChef
Stealc
2024-02-20Washington PostLeo Sands
‘World’s most harmful’ cybercriminal group disrupted in 11-nation operation
LockBit LockBit LockBit
2024-02-20EuropolEuropol
Law enforcement disrupt world’s biggest ransomware operation
LockBit LockBit LockBit
2024-02-20National Crime AgencyNational Crime Agency (NCA)
International investigation disrupts the world’s most harmful cyber crime group
LockBit LockBit LockBit