Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-01MandiantAdrian Hernandez, Asli Koksal, Jonathan Leathery, Ofir Rozmann, Sarah Bock
Uncharmed: Untangling Iran's APT42 Operations
TAMECAT
2024-05-01Trend MicroFeike Hacquebord, Fernando Mercês
Router Roulette: Cybercriminals and Nation-States Sharing Compromised Networks
Ngioweb SSHDoor
2024-05-01MacnicaMacnica Networks
The Reality of Targeted Attacks and Countermeasures: Trends in Cyber Espionage (Targeted Attacks) Targeting Japan FY2023
LODEINFO NOOPDOOR
2024-05-01MicrosoftDimitrios Valsamaras
“Dirty stream” attack: Discovering and mitigating a common vulnerability pattern in Android apps
2024-05-01Natto ThoughtsNatto Team
Ransom-War: Russian Extortion Operations as Hybrid Warfare, Part One
Clop Conti Maze TrickBot
2024-04-30IntrinsecIntrinsec
Matanbuchus & Co: Code Emulation and Cybercrime Infrastructure Discovery
FAKEUPDATES Matanbuchus
2024-04-30ElasticCyril François, Samir Bousseaden
Dissecting REMCOS RAT: An in- depth analysis of a widespread 2024 malware, Part Two
Remcos
2024-04-30TrellixMax Kersten
Pouring Acid Rain
AcidPour AcidRain
2024-04-300x0d4y0x0d4y
Latrodectus [IceNova] – Technical Analysis of the… New IcedID… Its Continuation… Or its Replacement?
Latrodectus
2024-04-29Securite360.netMuffin
Analysis of Sarwent loader: Old ways die hard
2024-04-29cyber5wcyber5w, M4lcode
How to unpack Death Ransomware
DeathRansom
2024-04-29ThreatMonKerime Gencay, MalwareR&DTeam
Understanding the 'Kapeka' Backdoor: Detailed Analysis by APT44
Kapeka
2024-04-29Twitter (@sekoia_io)sekoia
@sekoia_io's tweet about the (not so) new infostealer, named ACR Stealer
ACR Stealer
2024-04-29ZscalerSantiago Vicente
Zloader Learns Old Tricks
Zloader
2024-04-29The DFIR ReportThe DFIR Report
From IcedID to Dagon Locker Ransomware in 29 Days
IcedID Mount Locker
2024-04-27CySecurity NewsCySecurity News
Cryptocurrency Chaos: El Salvador's Bitcoin Wallet Code Leaked, Privacy at Risk
CiberInteligenciaSV
2024-04-27GoogleRommel-J
Finding Malware: Detecting SOGU with Google Security Operations.
PlugX
2024-04-25MandiantJamie Collier, Kelli Vanderlee
Poll Vaulting: Cyber Threats to Global Elections
Callisto
2024-04-25SOCRadarSOCRadar
Dark Web Profile: Red Ransomware
2024-04-25MicrosoftMicrosoft Incident Response Team
Guidance for Incident Responders