Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-30Technical Evolutiontechevo
REKOOBE APT-31 Linux Backdoor Analysis
Rekoobe
2024-11-28Hunt.ioHunt.io
Uncovering Threat Actor Tactics: How Open Directories Provide Insight into XWorm Delivery Strategies
XWorm
2024-11-28StrikeReadyStrikeReady Labs
RU APT targeting Energy Infrastructure (Unknown unknowns, part 3)
Edam Emmenhtal
2024-11-27Rapid7Natalie Zargarov
New “CleverSoar” Installer Targets Chinese and Vietnamese Users
ValleyRAT
2024-11-27ESET ResearchMartin Smolár, Peter Strýček
Bootkitty: Analyzing the first UEFI bootkit for Linux
Bootkitty
2024-11-26Security IntelligenceNir Somech
What’s up India? PixPirate is back and spreading via WhatsApp
PixPirate
2024-11-26Security AffairsPierluigi Paganini
The source code of Banshee Stealer leaked online
BANSHEE
2024-11-25Trend MicroLenart Bermejo, Leon M Chang, Ted Lee, Theo Chen
Game of Emperor: Unveiling Long Term Earth Estries Cyber Intrusions
SNAPPYBEE
2024-11-25LinkedIn (Idan Tarab)Idan Tarab
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield
2024-11-22WiredAndy Greenberg
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
2024-11-22Medium (@lcam)Luca Mella
How to target European SME with Ransomware? Through Zyxel!
HellDown Babuk
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
APT28
2024-11-21Recorded FutureInsikt Group
Russia-Aligned TAG-110 Targets Asia and Europe with HATVIBE and CHERRYSPY
HATVIBE
2024-11-21ESET ResearchViktor Sperka
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
FireWood WolfsBane Icesword
2024-11-21IntrinsecCTI Intrinsec, Intrinsec
PROSPERO & Proton66: Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader
2024-11-20SPURSpur Engineering
The Threat of Residential Proxies to Sanctions Compliance
2024-11-20Natto ThoughtsNatto Team
Salt Typhoon: Churning Up a Storm of Consternation
2024-11-20Orange CyberdefenseMarine PICHON, Piotr Malachiński
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns
2024-11-20TrellixJambul Tologonov, John Fokker, Phuc Pham
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now
8Base CryptXXXX Dharma Phobos
2024-11-20IntrinsecEquipe CTI
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot