Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-21IntrinsecCTI Intrinsec, Intrinsec
PROSPERO & Proton66: Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader
2024-11-20SPURSpur Engineering
The Threat of Residential Proxies to Sanctions Compliance
2024-11-20Natto ThoughtsNatto Team
Salt Typhoon: Churning Up a Storm of Consternation
2024-11-20Orange CyberdefenseMarine PICHON, Piotr Malachiński
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns
2024-11-20TrellixJambul Tologonov, John Fokker, Phuc Pham
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now
8Base CryptXXXX Dharma Phobos
2024-11-20IntrinsecEquipe CTI
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot
2024-11-19Palo Alto Networks Unit 42Asher Davila, Chris Navarrete
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
FrostyGoop
2024-11-19Australian Signals DirectorateASD
Annual Cyber Threat Report 2023-2024
2024-11-19CrowdStrikeCounter Adversary Operations
Unveiling LIMINAL PANDA: A Closer Look at China's Cyber Threats to the Telecom Sector
Liminal Panda
2024-11-19LumenBlack Lotus Labs
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet
Ngioweb Ngioweb
2024-11-19Hunt.ioHunt.io
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
XenoRAT
2024-11-18KrollDave Truman, George Glass
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER)
Carbanak HijackLoader
2024-11-18BlackberryBlackBerry Research and Intelligence team
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign
Sync-Scheduler
2024-11-18TEHTRISTEHTRIS
Cryptbot downloader: A deep cryptanalysis
CryptBot
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb Water Barghest
2024-11-18LogpointAnish Bogati
Exploring Strela Stealer: Initial Payload Analysis and Insights
StrelaStealer
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-17Alessio Di Santo, Luca Di Domenico
Post about Tsunami
tsunami
2024-11-17IntezerRyan Robinson
Babble Babble Babble Babble Babble Babble BabbleLoader