Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb Water Barghest
2024-11-18LogpointAnish Bogati
Exploring Strela Stealer: Initial Payload Analysis and Insights
StrelaStealer
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-15Information Security BuzzKirsten Doyle
Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector
TA455
2024-11-15VolexityCallum Roxan, Charlie Gardner, Paul Rascagnères
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
lightSpy LIGHTSPY BH_A006 DEEPDATA DEEPPOST BrazenBamboo
2024-11-14EclecticIQEclecticIQ Threat Research Team
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
SilkSpecter
2024-11-14cyjaxRoman Faithfull
An elephant in Kairos: data-leak site emerges for new extortion group
Kairos
2024-11-14Palo AltoUnit 42
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
BeaverTail InvisibleFerret WageMole
2024-11-13SekoiaColine Chavane, Sekoia TDR
A three-beat waltz: The ecosystem behind Chinese state-sponsored cyber threats
2024-11-13TEHTRISTEHTRIS
Cracking Formbook malware: Blind deobfuscation and quick response techniques
Formbook
2024-11-12BlackberryBlackBerry Research & Intelligence Team
LightSpy: APT41 Deploys Advanced DeepData Framework In Targeted Southern Asia Espionage Campaign
DEEPDATA
2024-11-12SecurityScorecardRyan Sherstobitoff
The Botnet is Back: SSC STRIKE Team Uncovers a Renewed Cyber Threat
2024-11-12Hunt.ioHunt.io
Targeting Innovation: Sliver C2 and Ligolo-ng Used in Operation Aimed at Y Combinator
Sliver
2024-11-12DataBreaches.netDissent
Amazon confirms employee data breach after vendor hack
Nam3L3ss
2024-11-08FortinetXiaopeng Zhang
New Campaign Uses Remcos RAT to Exploit Victims
Remcos
2024-11-08Trend MicroLenart Bermejo, Leon M Chang, Ted Lee
Breaking Down Earth Estries' Persistent TTPs in Prolonged Cyber Operations
2024-11-08Rostelecom-SolarSolar 4RAYS
The Elusive GoblinRAT – The Story Behind the Most Secretive and Mysterious Linux Backdoor Found in Government Infrastructures
2024-11-07Cisco TalosAliza Johnson, Chetan Raghuprasad, Elio Biasiotto, Michael Szeliga
Unwrapping the emerging Interlock ransomware attack
Rhysida
2024-11-07ESET ResearchESET Research
APT Activity Report: Abusing Cloud Services and VPN Platforms in the Pursuit of New Prey
FrostyNeighbor
2024-11-07Perception PointArthur Vaiselbuh
Evasive ZIP Concatenation: Trojan Targets Windows Users
SmokeLoader