Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-26Security IntelligenceNir Somech
What’s up India? PixPirate is back and spreading via WhatsApp
PixPirate
2024-11-22cocomelonccocomelonc
Linux malware development 3: linux process injection with ptrace. Simple C example.
EvilGnome HiddenWasp Turla RAT
2024-11-22MicrosoftMicrosoft Threat Intelligence
Microsoft shares latest intelligence on North Korean and Chinese threat actors at CYBERWARCON
Storm-2077
2024-11-22WiredAndy Greenberg
Russian Spies Jumped From One Network to Another Via Wi-Fi in an Unprecedented Hack
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
APT28
2024-11-20Orange CyberdefenseMarine PICHON, Piotr Malachiński
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns
2024-11-20IntrinsecEquipe CTI
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot
2024-11-19Palo Alto Networks Unit 42Asher Davila, Chris Navarrete
FrostyGoop’s Zoom-In: A Closer Look into the Malware Artifacts, Behaviors and Network Communications
FrostyGoop
2024-11-19LumenBlack Lotus Labs
One Sock Fits All: The Use And Abuse Of The NSOCKS Botnet
Ngioweb Ngioweb
2024-11-19Hunt.ioHunt.io
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
XenoRAT
2024-11-18KrollDave Truman, George Glass
CARBANAK (aka ANUNAK) Distributed via IDATLOADER (aka HIJACKLOADER)
Carbanak HijackLoader
2024-11-18BlackberryBlackBerry Research and Intelligence team
Suspected Nation-State Adversary Targets Pakistan Navy in Cyber Espionage Campaign
Sync-Scheduler
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb Water Barghest
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-15Information Security BuzzKirsten Doyle
Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector
TA455
2024-11-14EclecticIQEclecticIQ Threat Research Team
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
SilkSpecter
2024-11-14eSentireeSentire
Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2
BeaverTail InvisibleFerret
2024-11-14Palo AltoUnit 42
Fake North Korean IT Worker Linked to BeaverTail Video Conference App Phishing Attack
BeaverTail InvisibleFerret WageMole
2024-11-13TEHTRISTEHTRIS
Cracking Formbook malware: Blind deobfuscation and quick response techniques
Formbook