Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-09-25Group-IBGroup-IB
Inside the Dragon: DragonForce Ransomware Group
DEVMAN
2024-09-25The RegisterLaura Dobberstein
China claims Taiwan, not civilians, behind web vandalism
Anonymous64
2024-09-25SC MediaSC Staff
Austria subjected to pro-Russian DDoS intrusions
OverFlame
2024-09-25CloudflareCloudforce One
Unraveling SloppyLemming’s Operations Across South Asia
SloppyLemming
2024-09-25Medium b.magnezi0xMrMagnezi
Lumma Stealer - Malware Analysis
Lumma Stealer
2024-09-24Virus BulletinAragorn Tseng, Chi-Yu You, Cristiana Brafman Kittner, Steve Su
Down the GRAYRABBIT HOle - Exposing UNC3569 and its Modus Operandi
KEYPLUG Cobalt Strike CROSSWALK GRAYRABBIT HelloBot HUI Loader PlugX SiestaGraph
2024-09-24K7 SecurityPriyadharshini P
From LNK to RAT: Deep Dive into the LNK Malware Infection Chain
2024-09-24Virus BulletinGeorgy Kucherin, Marc Rivero López
The Mask Has Been Unmasked Again
Careto
2024-09-24Trend MicroLenart Bermejo, Sunny Lu, Ted Lee
Earth Preta Evolves its Attacks with New Malware and Strategies
FDMTP
2024-09-24ThreatFabricThreatFabric
Octo2: European Banks Already Under Attack by New Malware Variant
Coper
2024-09-23Palo Alto Networks Unit 42Dominik Reichel, Yaron Samuel
Inside SnipBot: The Latest RomCom Malware Variant
ROMCOM RAT
2024-09-22BushidoTokenBushidoToken
The Russian APT Tool Matrix
MimiKatz reGeorg
2024-09-21Mandar Naik
Malware Analysis - PXRECVOWEIWOEI
0bj3ctivityStealer
2024-09-20Trend MicroCharles Adrian Marty, Christian Alpuerto, John Paul Lim, Kyle Philippe Yu, Mark Chester De Quiroz, Mohammed Malubay
How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections
RansomHub Water Bakunawa
2024-09-20CISO SeriesSteve Prentice
Cybersecurity News: INC targets healthcare, Providence schools cyberattack, Apple iPads bricked
INC Storm-0494
2024-09-20McAfeeAayush Tyagi, Yashvi Shah
Behind the CAPTCHA: A Clever Gateway of Malware
Emmenhtal Lumma Stealer
2024-09-19Palo Alto Networks Unit 42Dominik Reichel
Discovering Splinter: A First Look at a New Post-Exploitation Red Team Tool
Splinter
2024-09-19GooglePraveeth DSouza
Finding Malware: Unveiling RECORDSTEALER with Google Security Operations
RecordBreaker
2024-09-19PWCJohn Southworth
COLDWASTREL of space
Callisto
2024-09-19MandiantMark Lechtik, Matan Mimran, Sarah Bock, Stav Shulman
UNC1860 and the Temple of Oats: Iran’s Hidden Hand in Middle Eastern Networks
OATBOAT