Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2023-05-24Check Point ResearchJiri Vinopal, Marc Salinas Fernandez
Agrius Deploys MoneyBird in Targeted Attacks against Israeli Organizations
Pink Sandstorm
2023-05-24SecureworksCounter Threat Unit ResearchTeam
Chinese Cyberespionage Group BRONZE SILHOUETTE Targets U.S. Government and Defense Organizations
Volt Typhoon
2023-05-24MicrosoftMicrosoft Threat Intelligence
Volt Typhoon targets US critical infrastructure with living-off-the-land techniques
Volt Typhoon
2023-05-24CISACISA
AA23-144a: People's Republic of China State-Sponsored Cyber Actor Living off the Land to Evade Detection
2023-05-23ClearSkyClearSky Research Team
Fata Morgana: Watering hole attack on shipping and logistics websites
2023-05-23Cert-AgIDCert-AgID
Technical analysis and considerations on Strela malware
StrelaStealer
2023-05-23SecplicityRyan Estes
Scratching the Surface of Rhysida Ransomware
Rhysida
2023-05-23loginsoftSaharsh Agrawal
Taming the Storm: Understanding and Mitigating the Consequences of CVE-2023-27350
Clop LockBit Silence
2023-05-23ESET ResearchLukáš Štefanko
Android app breaking bad: From legitimate screen recording to file exfiltration within a year
2023-05-22AhnLabASEC
Kimsuky Group Using Meterpreter to Attack Web Servers
Kimsuky Meterpreter
2023-05-22kienmanowar Blogm4n0w4r
[Case study] Decrypt strings using Dumpulator
2023-05-22Trend MicroBahaa Yamany, Mahmoud Zohdy, Mohamed Fahmy, Sherif Magdy
BlackCat Ransomware Deploys New Signed Kernel Driver
BlackCat
2023-05-22Cluster25Cluster25 Threat Intel Team
Back in Black: BlackByte Ransomware returns with its New Technology (NT) version
BlackByte
2023-05-20DataBreaches.netDissent
Peachtree Orthopedics alerts patients to cyberattack; third patient data breach in seven years
TheDarkOverlord
2023-05-19YouTube (NorthSec)Ivan Kwiatkowski
Go reverse-engineering workshop
GoldMax
2023-05-19cocomelonccocomelonc
Malware source code investigation: AsyncRAT
AsyncRAT
2023-05-18zimperiumNicolás Chiaraviglio
Zimperium’s MTD Against OilAlpha: A Comprehensive Defense Strategy
OilAlpha
2023-05-18AhnLabASEC
SparkRAT Being Distributed Within a Korean VPN Installer
SparkRAT
2023-05-18IntezerRyan Robinson
How Hackers Use Binary Padding to Outsmart Sandboxes and Infiltrate Your Systems
Emotet
2023-05-18Nikhil Hegde
Looking Closer at BPF Bytecode in BPFDoor
BPFDoor