Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-10Palo Alto Networks Unit 42Jerome Tujague, Navin Thomas
Threat Assessment: Repellent Scorpius, Distributors of Cicada3301 Ransomware
Cicada3301
2024-09-10ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ailurophile Stealer Technical Malware Analysis Report
2024-09-06splunkSplunk Threat Research Team
Handala’s Wiper: Threat Analysis and Detections
Handala Hatef Handala
2024-09-05FortinetCara Lin, Vincent Li
Threat Actors Exploit GeoServer Vulnerability CVE-2024-36401
SideWalk
2024-09-04Natto ThoughtsNatto Team
Reconnaissance Scanning Tools Used by Chinese Threat Actors and Those Available in Open Source
scanbox Ladon Yasso
2024-08-30MicrosoftMicrosoft Threat Intelligence
North Korean threat actor Citrine Sleet exploiting Chromium zero-day
FudModule Lazarus Group
2024-08-27DailyDarkWebDailyDarkWeb
Threat Actor Claimed to Breach Database of DimeCuba
SILKFIN AGENCY
2024-08-23DailyDarkWebDailyDarkWeb
A Threat Actor Alleged Breach of Sri Lankan Farmers Community Database
SILKFIN AGENCY
2024-08-20DailyDarkWebDailyDarkWeb
Threat Actor Claims Breach of Siam Cement Group Database
SILKFIN AGENCY
2024-08-20SymantecSymantec Threat Hunter Team
New Backdoor Targeting Taiwan Employs Stealthy Communications
Msupedge
2024-08-20ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
CyberVolk Ransomware Technical Malware Analysis Report
2024-08-20Intel 471Intel 471
Threat Hunting Case Study: Tracking Down GootLoader
GootLoader
2024-08-18Anchored Narratives on Threat Intelligence and GeopoliticsRJM
Reversing DISGOMOJI with Malcat like a BOSS
DISGOMOJI
2024-08-08Twitter (@MonThreat)ThreatMon
Tweet about EvilByte claiming to have hacked Argentine Radio
Evilbyte
2024-08-07SymantecThreat Hunter Team
Cloud Cover: How Malicious Actors Are Leveraging Cloud Services
GoGra Grager MOONTAG Ondritols TONERJAM
2024-08-07ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
AzzaSec Ransomware Technical Malware Analysis
HiddenTear
2024-08-05ThreatFabricThreatFabric
Chameleon is now targeting employees: Masquerading as a CRM app
Chameleon
2024-08-01Idan Malihi
Dissecting Agent Tesla: Unveiling Threat Vectors and Defense Mechanisms
Agent Tesla
2024-07-31SecuronixSecuronix
Research Update: Threat Actors Behind the DEV#POPPER Campaign Have Retooled and are Continuing to Target Software Developers via Social Engineering
BeaverTail
2024-07-29loginsoftSaharsh Agrawal
Blue Screen Mayhem: When CrowdStrike's Glitch Became Threat Actor's Playground
Daolpu HijackLoader Remcos