Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-11-30Technical Evolutiontechevo
REKOOBE APT-31 Linux Backdoor Analysis
Rekoobe
2024-11-26Security AffairsPierluigi Paganini
The source code of Banshee Stealer leaked online
BANSHEE
2024-11-25LinkedIn (Idan Tarab)Idan Tarab
The IT Army of Ukraine: Cyber Resistance in the Digital Battlefield
2024-11-22Medium (@lcam)Luca Mella
How to target European SME with Ransomware? Through Zyxel!
HellDown Babuk
2024-11-22VolexitySean Koessel, Steven Adair, Tom Lancaster
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access
2024-11-21ESET ResearchViktor Sperka
Unveiling WolfsBane: Gelsemium’s Linux counterpart to Gelsevirine
FireWood WolfsBane Icesword
2024-11-21IntrinsecCTI Intrinsec, Intrinsec
PROSPERO & Proton66: Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader
2024-11-20Orange CyberdefenseMarine PICHON, Piotr Malachiński
The hidden network: How China unites state, corporate, and academic assets for cyber offensive campaigns
2024-11-20TrellixJambul Tologonov, John Fokker, Phuc Pham
Phobos: Stealthy Ransomware That Operated Under the Radar - Until Now
8Base CryptXXXX Dharma Phobos
2024-11-20IntrinsecEquipe CTI
PROSPERO & Proton66: Tracing Uncovering the links between bulletproof networks
Coper SpyNote FAKEUPDATES GootLoader EugenLoader IcedID Matanbuchus Nokoyawa Ransomware Pikabot
2024-11-19Hunt.ioHunt.io
XenoRAT Adopts Excel XLL Files and ConfuserEx as Access Method
XenoRAT
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghest’s Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb Water Barghest
2024-11-18LogpointAnish Bogati
Exploring Strela Stealer: Initial Payload Analysis and Insights
StrelaStealer
2024-11-18Trend MicroFeike Hacquebord, Fernando Mercês
Inside Water Barghests Rapid Exploit-to-Market Strategy for IoT Devices
Ngioweb
2024-11-15Information Security BuzzKirsten Doyle
Iranian “Dream Job” Cyber Campaign Targets Aerospace Sector
TA455
2024-11-15VolexityCallum Roxan, Charlie Gardner, Paul Rascagnères
BrazenBamboo Weaponizes FortiClient Vulnerability to Steal VPN Credentials via DEEPDATA
lightSpy LIGHTSPY BH_A006 DEEPDATA DEEPPOST BrazenBamboo
2024-11-14EclecticIQEclecticIQ Threat Research Team
Inside Intelligence Center: Financially Motivated Chinese Threat Actor SilkSpecter Targeting Black Friday Shoppers
SilkSpecter
2024-11-14cyjaxRoman Faithfull
An elephant in Kairos: data-leak site emerges for new extortion group
Kairos
2024-11-14eSentireeSentire
Bored BeaverTail & InvisibleFerret Yacht Club – A Lazarus Lure Pt.2
BeaverTail InvisibleFerret