Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-05-06ElasticDaniel Stepanic, Jia Yu Chan, Seth Goodwin, Terrance DeJesus
TCLBANKER: Brazilian Banking Trojan Spreading via WhatsApp and Outlook
TCLBANKER
2026-04-02ElasticRemco Sprooten, Ruben Groenewoud
Hooked on Linux: Rootkit Detection Engineering
2026-03-05ElasticRemco Sprooten, Ruben Groenewoud
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft
2026-02-19ElasticElastic Security Labs, Salim Bitam
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
AstarionRAT
2025-12-30US Department of JusticeOffice of Public Affairs
Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware
BlackCat BlackCat
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM WARP PANDA
2025-11-15ElasticJia Yu Chan, Salim Bitam
RONINGLOADER: DragonBreath’s New Path to PPL Abuse
DragonBreath RONINGLOADER
2025-10-27Trend MicroEmmanuel Panopio, Jeffrey Francis Bonaobra, Joe Soares
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C
Water Saci
2025-10-21ElasticAndrew Pease, Braxton Williams, Daniel Stepanic, Jia Yu Chan, Salim Bitam, Seth Goodwin
TOLLBOOTH: What's yours, IIS mine
TOLLBOOTH
2025-10-14ReliaquestRELIAQUEST THREAT RESEARCH TEAM
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise
2025-09-30ElasticElastic
WARMCOOKIE One Year Later: New Features and Fresh Insights
WarmCookie
2025-09-25ESET ResearchMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Virus BulletinMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-07-29ElasticElastic, Jia Yu Chan
MaaS Appeal: An Infostealer Rises From The Ashes
Nova Stealer
2025-07-17Medium Ireneusz TarnowskiIreneusz Tarnowski
Dissecting the ClickFix User-Execution Attack and Its Sophisticated Persistence via ADS
Cobalt Strike
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident