Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-19Medium MITRE-EngenuityCharles Clancy, Lex Crumpton
Advanced Cyber Threats Impact Even the Most Prepared
2024-04-18Cert-UACert-UA
UAC-0149 cyberattack exploiting Signal, CVE-2023-38831 vulnerability, and COOKBOX malware (CERT-UA#9522)
COOKBOX
2024-04-18AvastLuigino Camastra
From BYOVD to a 0-day: Unveiling Advanced Exploits in Cyber Recruiting Scams
FudModule
2024-04-13cyber5wcyber5w, M4lcode
Analysis of malicious Microsoft office macros
AsyncRAT Ave Maria
2024-04-09Israel National Cyber DirectorateIsrael National Cyber Directorate
קבוצת התקיפה האיראנית Black Shadow
2024-04-07cyber5wM4lcode
Gafgyt Backdoor Analysis
Bashlite
2024-03-27EclecticIQArda Büyükkaya
Operation FlightNight: Indian Government Entities and Energy Sector Targeted by Cyber Espionage Campaign
HackBrowserData
2024-03-21cyber5wM4lcode
CryptNet Ransomware Detailed Analysis
CryptNET
2024-03-20MicrosoftSherrod DeGrippo
Tax season cybersecurity: What cybercriminals want and who they target most. Is it you?
2024-03-20CISACyber Safety Review Board
Review of the Summer 2023 Microsoft Exchange Online Intrusion
Storm-0558
2024-03-15cyber5wM4lcode
Matanbuchus Loader Detailed Analysis
Matanbuchus
2024-03-14Orange CyberdefenseAmaury G., Grégoire Clermont, Livia Tibirna, Maël SARP, Marine PICHON, Vincent HINDERER, Ziad MASLAH
Unveiling the depths of residential proxies providers
2024-03-11CyberIntAdi Bleih
GuLoader Downloaded: A Look at the Latest Iteration
CloudEyE
2024-03-01GatewatcherGatewatcher
CYBER THREATS SEMESTER REPORT (July - December 2023) (paywall)
2024-02-27US Department of DefenseUS Department of Defense
Russian Cyber Actors Use Compromised Routers to Facilitate Cyber Operations
MooBot
2024-02-26SpyCloudAshley Allocca, Kyla Cardona
“Pantsless Data”: Decoding Chinese Cybercrime TTPs
2024-02-26Twitter (@embee_research)Embee_research
Advanced CyberChef Techniques for Configuration Extraction - Detailed Walkthrough and Examples
NetSupportManager RAT
2024-02-26NCSC UKNCSC UK
SVR cyber actors adapt tactics for initial cloud access
2024-02-26cyber5wAmr Ashraf
Pikabot Loader Detailed Analysis
Pikabot
2024-02-25YouTube (Embee Research)Embee_research
My Longest CyberChef Recipe Ever - 22 Operation Configuration Extractor
NetSupportManager RAT