Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-07-06CISACISA
Increased Truebot Activity Infects U.S. and Canada Based Networks
Silence
2023-07-05Aqua NautilusAssaf Morag, Ofek Itach
Threat Alert: Anatomy of Silentbob’s Cloud Attack
TeamTNT Tsunami
2023-07-05QianxinRed Raindrop Team
Patchwork Group Utilizing WarHawk Backdoor Variant "Spyder" for Espionage against Multiple Countries
Spyder Patchwork
2023-07-05The RecordDaryna Antoniuk
Belarusian hacktivists сlaim to breach country’s leading state university
Cyber Partisans
2023-07-05SentinelOnePhil Stokes
BlueNoroff | How DPRK’s macOS RustBucket Seeks to Evade Analysis and Detection
RustBucket
2023-07-04Qianxin Threat Intelligence CenterThreat Intelligence Center
Suspected Maha Grass Organization Uses WarHawk Backdoor Variant Spyder to Spy on Multiple Countries
Spyder Patchwork WarHawk
2023-07-04The RecordJonathan Greig
Fort Worth officials say leaked data came from Public Information Act request
SiegedSec
2023-07-03Check Point ResearchCheckpoint Research
Chinese Threat Actors Targeting Europe in SmugX Campaign
DOPLUGS SmugX
2023-07-03AhnLabASEC
Crysis Threat Actor Installing Venus Ransomware Through RDP
Dharma
2023-06-30MandiantMandiant
Barracuda ESG: CVE-2023-2868 Hardening Recommendations
UNC4841
2023-06-30Github (itaymigdal)Itay Migdal
Formbook unpacking
Formbook
2023-06-29BusinessWireDaria Zhukova
Dark Web Intelligence Shows Everest Ransomware Group Increasing Initial Access Broker Activity
2023-06-29MalwareBookReportsmuzi
GuLoader: Navigating a Maze of Intricacy
CloudEyE
2023-06-29SentinelOneAlex Delamotte, Jim Walter
Rhysida Ransomware | RaaS Crawls Out of Crimeware Undergrowth to Attack Chilean Army
Rhysida
2023-06-28BI. ZONE Cyber Threats Research TeamOleg Skulkin
Red Wolf is back to spy on commercial firms Red Wolf is back to spy on commercial firms
RedCurl
2023-06-28MandiantAlexander Marvi, Greg Blaum, Ron Craft
Detection, Containment, and Hardening Opportunities for Privileged Guest Operations, Anomalous Behavior, and VMCI Backdoors on Compromised VMware Hosts
UNC3886
2023-06-28AhnLabSanseo
Kimsuky Attack Group Abusing Chrome Remote Desktop
Appleseed
2023-06-27Youtube (PROIDEA Events)Michał Łopacki, Piotr Zarzycki
Piotr Zarzycki, Michał Łopacki - Proxy dla przestępców na Twoim urządzeniu [OMH 2022]
2023-06-26ThreatFabricThreatFabric
Anatsa banking Trojan hits UK, US and DACH with new campaign
Anatsa
2023-06-23SecuronixDen Iyzvyk, Oleg Kolesnikov, Tim Peck
Detecting New MULTI#STORM Attack Campaign Involving Python-based Loader Masquerading as OneDrive Utilities to Drop Multiple RAT Payloads With Security Analytics
Ave Maria