Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-25Suresh Reddy
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads
2025-03-14bluecyberNgo Thanh Van
PlugX: Bad guy disguises as an msi file
PlugX
2025-03-14Twitter (@CERTCyberdef)Alexandre Matousek, Marine PICHON
Tweet on Emmenhtal v3
Emmenhtal Lumma Stealer Rhadamanthys
2025-03-11Juniper NetworksCybersecurity R&D
The RedPenguin Malware Incident
tsh
2025-03-10CybershafaratTreadstone 71
DieNet and #Shiite_Harvest claimed responsibility for disabling ten significant Iraqi websites
DieNet
2025-03-06Orange CyberdefenseOrange Cyberdefense
Dossier Bybit : Le plus gros hack de l’histoire de la finance
2025-03-05CyberScoopTim Starks
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement
2025-02-28Intel 471Intel 471
Black Basta exposed: A look at a cybercrime data leak
Black Basta Black Basta
2025-02-27MicrosoftSteven Masada
Disrupting a global cybercrime network abusing generative AI
Storm-2139
2025-02-27Cyber GeeksCyberMasterV
Russian campaign targeting Romanian WhatsApp numbers
2025-02-20RedHotCyberPietro Melillo
Linkc Ransomware: The New Cybercriminal Group Targeting Artificial Intelligence Data
LinkC Pub
2025-02-20Cyber TriageChris Ray
WMI Malware: The Complete Forensics Guide
ShrinkLocker
2025-02-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors
NailaoLocker PlugX ShadowPad
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-18Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
IOCs Green Nailao campaign (NailaoLocker, ShadowPad)
NailaoLocker PlugX ShadowPad
2025-02-13MoonlockMoonlock
Cybercrooks Are Using Fake Job Listings to Steal Crypto
GolangGhost
2025-02-12cyber.wtf blogHendrik Eckardt, Leonard Rapp
Unpacking Pyarmor v8+ scripts
AsyncRAT DCRat XWorm
2025-02-12The Hacker NewsRavie Lakshmanan
North Korean Hackers Exploit PowerShell Trick to Hijack Devices in New Cyberattack
2025-02-11EclecticIQArda Büyükkaya
Sandworm APT Targets Ukrainian Users with Trojanized Microsoft KMS Activation Tools in Cyber Espionage Campaigns
Kalambur BACKORDER DCRat
2025-02-11CyberSecurityNewsDo Son
Sandworm APT Exploits Trojanized KMS Tools to Target Ukrainian Users in Cyber Espionage Campaign
DCRat