Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2022-12-29The RecordDaryna Antoniuk
This app will self-destruct: How Belarusian hackers created an alternative Telegram for activists
Cyber Partisans
2022-12-29Minerva LabsNatalie Zargarov
New CatB Ransomware Employs 2-Year Old DLL Hijacking Technique To Evade Detection
CatB
2022-12-28NSFOCUSFuying Laboratory
Analysis of Cyber Attacks by APT Organization Confucius Against IBO Anti-Terrorism Operations in Pakistan
Confucius Confucious
2022-12-24di.sclosu.redi.sclosu.re
njRAT malware spreading through Discord CDN and Facebook Ads
NjRAT
2022-12-23Quick HealDigvijay Mane
Protect yourself from Vishing Attack!!
2022-12-22Cert-UACert-UA
Cyber ​​attack on DELTA system users using RomCom/FateGrab/StealDeal malware (CERT-UA#5709)
ROMCOM RAT
2022-12-21TrustwaveWojciech Cieslak
Malicious Macros Adapt to Use Microsoft Publisher to Push Ekipa RAT
Ekipa RAT
2022-12-21TrendmicroByron Gelera, Don Ovid Ladores, Ivan Nicole Chavez, Khristian Joseph Morales, Monte de Jesus
Conti Team One Splinter Group Resurfaces as Royal Ransomware with Callback Phishing Attacks
Royal Ransom
2022-12-21Team CymruS2 Research Team
Inside the IcedID BackConnect Protocol
IcedID
2022-12-20ThreatBookThreatBook
Analysis of APT-C-60 Attack on South Korea
SpyGrace
2022-12-20The RecordAlexander Martin
Russian hackers targeted petroleum refining company in NATO state
2022-12-19kienmanowar Blogm4n0w4r, Tran Trung Kien
[Z2A]Bimonthly malware challege – Emotet (Back From the Dead)
Emotet
2022-12-18ZAYOTEMAbdül Samed DOĞAN, Emirhan KESKİN
Raccoon Stealer Technical Analysis Report
Raccoon
2022-12-16SOCRadarSOCRadar
Dark Web Profile: Killnet – Russian Hacktivist Group
Zarya
2022-12-16Carnegie Endowment for International PeaceJon Bateman
Russia’s Wartime Cyber Operations in Ukraine: Military Impacts, Influences, and Implications
2022-12-15EuropolEuropol
Global crackdown against DDoS services shuts down most popular platforms
2022-12-15NOZOMI Network LabsNozomi Networks Labs
Tracking Malicious Glupteba Activity Through the Blockchain
Glupteba
2022-12-14ESET ResearchDominik Breitenbacher
Unmasking MirrorFace: Operation LiberalFace targeting Japanese political entities
LODEINFO MirrorFace
2022-12-13KrollDave Truman, George Glass, Keith Wojcieszek, Stephen Green
Threat Actors use Google Ads to Deploy VIDAR Stealer
Vidar
2022-12-12Palo Alto Networks Unit 42Oz Soprin, Shachar Roitman
Precious Gemstones: The New Generation of Kerberos Attacks