Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-05-08Medium (montysecurity)montysecurity
From OSINT to Disk: Wave Stealer Analysis
Wave Stealer
2024-05-08ElasticElastic
Elastic Security - WarmCookie YARA Rule
WarmCookie
2024-05-07ElasticElastic
Elastic Security - GhostEngine YARA Rule
win.ghostengine
2024-05-07KrebsOnSecurityBrian Krebs
U.S. Charges Russian Man as Boss of LockBit Ransomware Group
LockBit
2024-05-06Security AffairsPierluigi Paganini
El Salvador suffered a massive leak of biometric data
CiberInteligenciaSV
2024-04-27CySecurity NewsCySecurity News
Cryptocurrency Chaos: El Salvador's Bitcoin Wallet Code Leaked, Privacy at Risk
CiberInteligenciaSV
2024-04-27GoogleRommel-J
Finding Malware: Detecting SOGU with Google Security Operations.
PlugX
2024-04-24NCSC UKNCSC UK
Line Dancer - In-memory shellcode loader targeting Cisco Adaptive Security Appliance (ASA) devices.
2024-04-24NCSC UKNCSC UK
Line Runner: Persistent webshell targeting Cisco Adaptive Security Appliance (ASA) devices.
2024-04-22Security AffairsPierluigi Paganini
Hackers threaten to leak a copy of the World-Check database used to assess potential risks associated with entities
GhostR
2024-04-20Axel's IT Security ResearchAxel Mahr
New Robust Technique for Reliably Identifying AsyncRAT/DcRAT/VenomRAT Servers
AsyncRAT DCRat Venom RAT
2024-04-15SecurityWeekEduard Kovacs
Destructive ICS Malware ‘Fuxnet’ Used by Ukraine Against Russian Infrastructure
BlackJack
2024-04-10ProofpointSelena Larson, Tommy Madjar
Security Brief: TA547 Targets German Organizations with Rhadamanthys Stealer
Rhadamanthys
2024-04-08GBHackers on SecurityDivya
Vedalia APT Group Exploits Oversized LNK Files to Deliver Malware
Opal Sleet
2024-04-05Heimdal SecurityMadalina Popovici
Powerhost’s ESXi Servers Encrypted with New SEXi Ransomware
SEXi SEXi
2024-04-03ResecurityResecurity
The New Version Of JsOutProx Is Attacking Financial Institutions In APAC And MENA Via GitLab Abuse
JSOutProx
2024-03-26K7 SecurityVigneshwaran P
Unknown TTPs of Remcos RAT
Remcos
2024-03-21ProofpointProofpoint Threat Research Team
Security Brief: TA450 Uses Embedded Links in PDF Attachments in Latest Campaign
2024-03-20MicrosoftSherrod DeGrippo
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you?
2024-03-20K7 SecurityShanmugasundharam E
Python Ciphering : Delving into Evil Ant’s Ransomware’s Tactics
Evil Ant