Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-09-18KrebsOnSecurityBrian Krebs
Who's Behind the 8Base Ransomware Website?
8Base
2023-09-13SecurityScorecardVlad Pasca
A detailed analysis of the Money Message Ransomware
Money Message
2023-09-12Security IntelligenceGolo Mühr, Kat Metrick, Ole Villadsen
Email campaigns leverage updated DBatLoader to deliver RATs, stealers
DBatLoader
2023-09-08K7 SecuritySudeep Waingankar
RomCom RAT: Not Your Typical Love Story
ROMCOM RAT RomCom
2023-09-07SecurityIntelligenceClaire Zaboeva, Golo Mühr, Melissa Frydrych
New Hive0117 phishing campaign imitates conscription summons to deliver DarkWatchman malware
DarkWatchman
2023-09-07GoogleClement Lecigne, Google Threat Analysis Group, Maddie Stone
Active North Korean campaign targeting security researchers
2023-09-06MicrosoftMicrosoft Security Response Center (MSRC)
Results of Major Technical Investigations for Storm-0558 Key Acquisition
2023-08-29KrebsOnSecurityBrian Krebs
U.S. Hacks QakBot, Quietly Removes Botnet Infections
QakBot
2023-08-28National Coordination Center for Cyber Security
Gamaredon Activity amid Ukraine's Counteroffensive
Pteranodon
2023-08-25Github (telekom-security)Fabian Marquardt
DarkGate configuration extractor
DarkGate
2023-08-08Security Service of UkraineSecurity Service of Ukraine
Cyber Operation of Russian Intelligence Services as a Component of Confrontation on the Battlefield
2023-08-08Security Service of UkraineSecurity Service of Ukraine
SBU exposes russian intelligence attempts to penetrate Armed Forces' planning operations system
2023-08-070x7D0 Blogvedard
How the Nintendo Wii Security Was Defeated
Fail0verflow
2023-07-31Cado SecurityMatt Muir, Nate Bill
Cado Security Labs Encounter Novel Malware, Redis P2Pinfect
P2Pinfect
2023-07-29GoogleGoogle Cybersecurity Action Team
Threat Horizons August 2023 Threat Horizons Report
SharkBot Cobalt Strike
2023-07-27Bankinfo SecurityMathew J. Schwartz
Are Akira Ransomware's Crypto-Locking Malware Days Numbered?
Akira Ryuk
2023-07-25K7 SecurityVigneshwaran P
Akira’s Play with Linux
Akira
2023-07-25KrebsOnSecurityBrian Krebs
Who and What is Behind the Malware Proxy Service SocksEscort?
AVrecon
2023-07-18GitHubAlexis Wales
Security alert: social engineering campaign targets technology industry employees (Jade Sleet/Storm-0954)
2023-07-18Positive TechnologiesPTSecurity
Space Pirates: a look into the group's unconventional techniques, new attack vectors, and tools
Voidoor