Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2024-04-03ResecurityResecurity
The New Version Of JsOutProx Is Attacking Financial Institutions In APAC And MENA Via GitLab Abuse
JSOutProx
2022-11-25ResecurityResecurity
"In The Box" - Mobile Malware Webinjects Marketplace
Alien Cerberus Coper ERMAC Hydra
2022-09-05ResecurityResecurity
EvilProxy Phishing-As-A-Service With MFA Bypass Emerged In Dark Web
2022-08-25ResecurityResecurity
COVID-19 Data Put For Sale In Dark Web
2022-08-21ResecurityResecurity
Escanor Malware Delivered In Weaponized Microsoft Office Documents
2022-08-19ResecurityResecurity
Cybercriminals Are Targeting Law Enforcement Agencies Worldwide
2022-08-07ResecurityResecurity
LogoKit Update – The Phishing Kit Leveraging Open Redirect Vulnerabilities
2022-08-07ResecurityResecurity
Vulnerabilities In E-Commerce Solutions - Hunting On Big Apples
2022-07-17ResecurityResecurity
Shortcut-Based (LNK) Attacks Delivering Malicious Code On The Rise
AsyncRAT BumbleBee Emotet IcedID QakBot
2021-07-07Twitter (@resecurity_com)Resecurity
Tweet REvil attack chain used against Kaseya
REvil
2019-03-11PacktMelissa Dsouza
Resecurity reports ‘IRIDUIM’ behind Citrix data breach, 200+ government agencies, oil and gas companies, and technology companies also targeted.
IRIDIUM