Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-08-22NTT SecurityRintaro Koike, Ryu Hiyoshi
Attacks by malware abusing AppDomainManager Injection
2024-08-21Cisco TalosAsheer Malhotra, Guilherme Venere, Vitor Ventura
MoonPeak malware from North Korean actors unveils new details on attacker infrastructure
MoonPeak XenoRAT UAT-5394
2024-08-21OODA LoopOODA Loop
Toyota Customer, Employee Data Leaked in Confirmed Data Breach
ZeroSevenGroup
2024-08-20SiliconAngleDuncan Riley
Toyota alleges stolen customer data published on hacking site came from outside supplier
ZeroSevenGroup
2024-08-20DailyDarkWebDailyDarkWeb
Threat Actor Claims Breach of Siam Cement Group Database
SILKFIN AGENCY
2024-08-20SymantecSymantec Threat Hunter Team
New Backdoor Targeting Taiwan Employs Stealthy Communications
Msupedge
2024-08-20Intel 471Intel 471
Threat Hunting Case Study: Tracking Down GootLoader
GootLoader
2024-08-19RadwarePascal Geenens
MegaMedusa, RipperSec’s Public Web DDoS Attack Tool
megaMedusa RipperSec
2024-08-19AonDaniel Stein, Joshua Pivirotto, Stroz Friedberg, Zachary Reichert
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules
sedexp
2024-08-09BreachNovaOsama Ellahi
Full analysis on NJRAT
NjRAT
2024-08-08Twitter (@MonThreat)ThreatMon
Tweet about EvilByte claiming to have hacked Argentine Radio
Evilbyte
2024-08-08NSFOCUSNSFOCUS
New APT Group Actor240524: A Closer Look at Its Cyber Tactics Against Azerbaijan and Israel
ABCsync Actor240524
2024-08-08SOCRadarSOCRadar
Dark Peep #16: Play Ransomware & LockBit’s Alliance, BreachForums Leak, and CyberNiggers’ Revival
AzzaSec
2024-08-08cybleCyble Research Labs
Double Trouble: Latrodectus and ACR Stealer observed spreading via Google Authenticator Phishing Site
ACR Stealer Latrodectus
2024-08-07SymantecThreat Hunter Team
Cloud Cover: How Malicious Actors Are Leveraging Cloud Services
GoGra Grager MOONTAG Ondritols TONERJAM
2024-08-05BreachNovaOsama Ellahi
How attacker achive Email Spoofing, Message Spoofing, IP and UserAgent Spoofing
2024-08-01ElasticDaniel Stepanic, Seth Goodwin
BITS and Bytes: Analyzing BITSLOTH, a newly identified backdoor
BITSloth
2024-07-31SecuronixSecuronix
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering
BeaverTail
2024-07-30HackReadWAQAS
Hacker Scrapes and Publishes 100,000-Line CrowdStrike IoC List
SAMBASPIDER
2024-07-29loginsoftSaharsh Agrawal
Blue Screen Mayhem: When CrowdStrike's Glitch Became Threat Actor's Playground
Daolpu HijackLoader Remcos