Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-01Github (VenzoV)VenzoV
Deep Dive Fog ransomware
Fog
2025-05-01ZscalerThreatLabZ research team
I StealC You: Tracking the Rapid Changes To StealC
Stealc
2025-04-30ZAYOTEMTamer Burak Telseren
Oski Stealer Technical Analysis Report 2025
Oski Stealer
2025-04-29CERT-FRCERT-FR
Targeting and Compromise of French Entities Using the APT28 Intrusion Set
STEELHOOK MASEPIE Mocky LNK OCEANMAP
2025-04-29France DiplomatieFrance Diplomatie
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025)
2025-04-29TrustwaveTrustwave SpiderLabs
Yet Another NodeJS Backdoor (YaNB): A Modern Challenge
KongTuke
2025-04-29Recorded FutureInsikt Group
Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting
FAKEUPDATES MintsLoader GhostWeaver Stealc
2025-04-29LinkedIn (Ethical Hackers Academy)Ethical Hackers Academy
RansomHub Ransomware Deploys Malware to Breach Corporate Networks
FAKEUPDATES RansomHub
2025-04-28NetresecErik Hjelmvik
Decoding njRAT traffic with NetworkMiner
NjRAT
2025-04-25HiSolutionsMaik Würth, Mateo Mrvelj, Nicolas Sprenger
Rolling in the Deep(Web): Lazarus Tsunami
tsunami
2025-04-25CensysCensys
The Persistent Threat of Salt Typhoon: Tracking Exposures of Potentially Targeted Devices
MASOL
2025-04-25Twitter (@teamcymru_S2)TEAM CYMRU S2 THREAT RESEARCH
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure
2025-04-24MandiantMandiant
M-Trends 2025 Report
Akira Black Basta LockBit SystemBC GootLoader LockBit WIREFIRE Akira Black Basta Cobalt Strike LockBit RansomHub SystemBC
2025-04-24Positive TechnologiesPT Expert Security Center
Crypters And Tools. Part 2: Different Paws — Same Tangle
2025-04-240xreverseUtku Çorbacı
Understanding Alcatraz ~ Obfuscator Analysis [EN]
2025-04-24Silent PushSilent Push
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie
BeaverTail OtterCookie FrostyFerret GolangGhost InvisibleFerret GolangGhost
2025-04-23MicrosoftMicrosoft Threat Intelligence
Understanding the threat landscape for Kubernetes and containerized assets
Storm-1977
2025-04-23Trend MicroFeike Hacquebord, Stephen Hilt
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations
BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost
2025-04-23Medium b.magnezi0xMrMagnezi
AsyncRAT Malware Analysis
AsyncRAT
2025-04-22SentinelOneSentinelOne
What Is Fog Ransomware?
Fog