Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-01-10360 netlabAlex Turing, Hui Wang
Heads up! Xdr33, A Variant Of CIA’s HIVE Attack Kit Emerges
xdr33
2023-01-09TrendmicroFe Cureg, Hitomi Kimura, Ryan Maglaque, Trent Bessell
Gootkit Loader Actively Targets Australian Healthcare Industry
GootLoader GootKit
2023-01-06cybleCyble
LummaC2 Stealer: A Potent Threat To Crypto Users
Lumma Stealer
2023-01-05AttackIQFrancis Guibernau, Ken Towne
Emulating the Highly Sophisticated North Korean Adversary Lazarus Group
MagicRAT Tiger RAT
2023-01-05Bleeping ComputerBill Toulas
Bitdefender releases free MegaCortex ransomware decryptor
MegaCortex
2023-01-05LogpointAnish Bogati
A crowning achievement: Exploring the exploit of Royal ransomware
Royal Ransom
2023-01-04CSO OnlineApurva Venkat
Cyberattacks against governments jumped 95% in last half of 2022, CloudSek says
BlueHornet
2023-01-04dr4k0nia
Unpacking RedLine Stealer
RedLine Stealer
2023-01-04Bleeping ComputerSergiu Gatlan
Rackspace confirms Play ransomware was behind recent cyberattack
PLAY
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
APT41's Attack Chain: Exe-LolBins Leads to Powershell Backdoor with Telegram C2
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Reverse Engineering RokRAT: A Closer Look at APT37’s Onedrive-Based Attack Vector
RokRAT
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Threat Analysis: SharpPanda APT’s Attack Chain Targeting G20 Nations
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Unraveling the Complex Infection Chain: Analysis of the SideCopy APT's Attack
Action RAT
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
From Slides to Threats: Transparent Tribe’s New Attack on Indian Government Entities Using Malicious PPT
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
NestJS Stealer: Unraveling the Inner Workings of a New Cybersecurity Menace
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
Unraveling the Layers: Analysis of Kimsuky's Multi-Staged Cyberattack
Kimsuky
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Konni APT Chronicle: Tracing Their Intelligence-Driven Attack Chain
Konni
2023-01-01ThreatMonSeyit Sigirci (@h3xecute), ThreatMon Malware Research Team
The Anatomy of a Sidecopy Attack: From RAR Exploits to AllaKore RAT
AllaKore
2023-01-01Objective-SeePatrick Wardle
The Mac Malware of 2022
2022-12-30GOV.PLGovernment Plenipotentiary for the Security of Information Space of the Republic of Poland
Russian cyberattacks
NoName057(16)