Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-02-07CISACISA
PRC State-Sponsored Actors Compromise and Maintain Persistent Access to U.S. Critical Infrastructure
ScanLine
2024-02-06KnownsecKnownsec 404 Team
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool
Nimbo-C2 ORPCBackdoor
2024-02-06KnownsecK&XWS@Knownsec 404
APT-K-47 Organization Launches Espionage Attacks Using a New Trojan Tool
Nimbo-C2 ORPCBackdoor
2024-02-06FortinetAxelle Apvrille
Reverse engineering of Android/Phoenix
Phoenix
2024-02-06Medium osamaellahiOsama Ellahi
Unfolding Agent Tesla: The Art of Credentials Harvesting.
Agent Tesla
2024-02-06Group-IBThreat Intelligence
Dead-end job: ResumeLooters gang infects websites with XSS scripts and SQL injections to vacuum up job seekers' personal data and CVs
ResumeLooters
2024-02-06The Hacker NewsNewsroom
Beware: Fake Facebook Job Ads Spreading 'Ov3r_Stealer' to Steal Crypto and Credentials
CrackedCantil Phemedrone Stealer
2024-02-06TrustwaveTrustwave SpiderLabs
Facebook Advertising Spreads Novel Malware Variant
Phemedrone Stealer
2024-02-06NCSC NLAIVD, MIVD
Ministry of Defense of the Netherlands uncovers COATHANGER, a stealthy Chinese FortiGate RAT
BOLDMOVE
2024-02-05@g0njxa
Tweet Highlighting the Integration of GhostSocks Service into Lumma Stealer
GhostSocks
2024-02-05YouTube (John Hammond)John Hammond, Ryan Chapman
PikaBot Malware Analysis: Debugging in Visual Studio
Pikabot
2024-02-05ReutersMichael Perry, Neil Jerome Morales
Philippines wards off cyber attacks from China-based hackers
2024-02-05PCriskTomas Meskauskas
How to remove CrackedCantil from the operating system
CrackedCantil
2024-02-04ViuleeenzAlessandro Strino
Understanding PEB and LDR Structures using IDA and LummaStealer
Lumma Stealer
2024-02-04InfostealersLambdaMamba
CrackedCantil: A Malware Symphony Breakdown
CrackedCantil
2024-02-03CloudsekPavan Karthick M
From Discussion Forums to Malware Mayhem: The Alarming Rise of Abuse on Google Groups and Usenet
CrackedCantil
2024-02-02The Cyber ExpressAshish Khaitan
Decoding KillNet 2.0 and Sylhet Gang-SG Cyberattack Plans for 2024
SYLHET GANG-SG
2024-02-02Github (shell-dot)shell-dot
Tuoni
Tuoni
2024-02-02StairwellThreat Research at Stairwell
Proactive response: AnyDesk, any breach
Agent Tesla
2024-02-02Cyber Kendraadmin
FritzFrog Botnet Expands Attack Arsenal with Log4Shell Exploits
FritzFrog