Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-17Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi, Shubham Singh, Sunil Bharti
Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet
Flodrix
2025-06-05ReliaquestRELIAQUEST THREAT RESEARCH TEAM
Scattered Spider Targets Tech Companies for Help-Desk Exploitation
2025-05-27MicrosoftMicrosoft Threat Intelligence
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Void Blizzard
2025-04-17Kaspersky LabsGReAT
IronHusky updates the forgotten MysterySnail RAT to target Russia and Mongolia
MysterySnail
2025-04-12CyberSecurity88CyberSecurity88
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack
MORH4x
2025-04-11ReliaquestRELIAQUEST THREAT RESEARCH TEAM
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique
2025-04-02BushidoTokenBushidoToken
Tracking Adversaries: EvilCorp, the RansomHub affiliate
RansomHub
2025-03-28Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure
DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun
2025-03-10LevelBlueKen Ng
Prevent, Detect, Contain: LevelBlue MDR’s Guide Against Black Basta Affiliates’ Attacks
Black Basta Black Basta ReedBed
2025-02-27BushidoTokenwilliam thomas
BlackBasta Leaks: Lessons from the Ascension Health attack
Black Basta
2025-02-27FortinetPei Han Liao
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan
ValleyRAT Winos
2025-02-20ReliaquestJohn Dilgen
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses
ReedBed
2025-01-23Github (PaloAltoNetworks)Brad Duncan
Cluster of Infrastructure likely used by Affiliate of Dark Scorpius (Black Basta)
ReedBed
2025-01-17Twitter (@Unit42_Intel)Unit 42
Tweet about affiliates of DarkScorpius using Social Engineering via MS Teams
UNC4393
2025-01-13Cert-AgIDCert-AgID
Analisi di una campagna Lumma Stealer con falso CAPTCHA condotta attraverso domino italiano compromesso
Lumma Stealer
2025-01-09Recorded FutureInsikt Group
Chinese State-Sponsored RedDelta Targeted Taiwan, Mongolia, and Southeast Asia with Adapted PlugX Infection Chain
PlugX
2024-12-29cocomelonccocomelonc
Malware and cryptography 38 - Encrypt/decrypt payload via Camellia cipher. S-box analyses examples. Simple C example.
2024-12-02FortiGuard LabsPei Han Liao
SmokeLoader Attack Targets Companies in Taiwan
SmokeLoader
2024-11-20SPURSpur Engineering
The Threat of Residential Proxies to Sanctions Compliance
2024-11-19Australian Signals DirectorateASD
Annual Cyber Threat Report 2023-2024