Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities
2025-02-18VaristKervin Alintanahin
Malvertisements, Fake Captchas and Infostealers
Lumma Stealer
2025-02-18Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
IOCs Green Nailao campaign (NailaoLocker, ShadowPad)
NailaoLocker PlugX ShadowPad
2025-02-18inversecosLina Lau
An inside look at NSA (Equation Group) TTPs from China’s lense
SECONDDATE
2025-02-18ProofpointProofpoint Threat Research Team
An Update on Fake Updates: Two New Actors, and New Mac Malware
Marcher FAKEUPDATES FrigidStealer Lumma Stealer
2025-02-15Medium TRAC LabsTRAC Labs
Don’t Ghost the SocGholish: GhostWeaver Backdoor
FAKEUPDATES
2025-02-15c-b.iocyb3rjerry
Dissecting a fresh BlankGrabber sample
BlankGrabber
2025-02-14Twitter (@DTCERT)Deutsche Telekom CERT
Twitter Thread on a password-protected loader observed in a vishing campaign
Unidentified 120
2025-02-13SecuronixDen Iyzvyk, Tim Peck
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks
RandomQuery
2025-02-13SymantecThreat Hunter Team
China-linked Espionage Tools Used in Ransomware Attacks
PlugX
2025-02-13Recorded FutureRecorded Future
Inside the Scam: North Korea’s IT Worker Threat
BeaverTail OtterCookie InvisibleFerret
2025-02-13Recorded FutureInsikt Group
RedMike (Salt Typhoon) Exploits Vulnerable Cisco Devices of Global Telecommunications Providers
GhostEmperor
2025-02-12Hunt.ioHunt.io
Tracking Pyramid C2: Identifying Post-Exploitation Servers in Hunt
Pyramid
2025-02-12DongaShin Gyu-jin
Suspected North Korean hacker hacks a large number of data from a government document system developer
2025-02-12cyber.wtf blogHendrik Eckardt, Leonard Rapp
Unpacking Pyarmor v8+ scripts
AsyncRAT DCRat XWorm
2025-02-12Red CanaryPhil Hagen, Tony Lambert
Defying tunneling: A Wicked approach to detecting malicious network traffic
AsyncRAT DCRat NjRAT XWorm
2025-02-12Bleeping ComputerBill Toulas
Surge in attacks exploiting old ThinkPHP and ownCloud flaws
2025-02-12The Hacker NewsRavie Lakshmanan
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
2025-02-11SekoiaPierre Le Bourhis
RATatouille: Cooking Up Chaos in the I2P Kitchen
Unidentified 118
2025-02-11EclecticIQArda Büyükkaya
Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
Kalambur BACKORDER DCRat