Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey
2025-12-07Reverse The MalwareDiyar Saadi
From Pixels to Payloads: Understanding Malicious BMP Files
2025-12-04Aryaka Networksbikash dash, varadharajan krishnasamy
Scam in the Cloud How Fraudsters Exploit Google Cloud Storage (GCS) for Deceptive Campaigns
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-12-02SynthientSynthient
IPCola: A Tangled Mess
Gaganode Gaganode Gaganode
2025-12-02Positive TechnologiesIgor Shiryaev, Kirill Navoshchik, Maxim Shamanov, Stanislav Pyzhov, Vladislav Lunin
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025
2025-12-01Koi SecurityTuval Admoni
4.3 Million Browsers Infected: Inside ShadyPanda's 7-Year Malware Campaign
2025-11-28OpenSourceMalwareOpenSourceMalware
"Contagious Interview" campaign abuses Microsoft VSCode tasks to drop malware and gain persistence
BeaverTail InvisibleFerret
2025-11-27Positive TechnologiesAlexander Badayev, Klimentiy Galkin, Vladislav Lunin
Dragons in Thunder
KrustyLoader Sliver
2025-11-26FortiGuard LabsVincent Li
ShadowV2 Casts a Shadow Over IoT Devices
ShadowV2
2025-11-26IntrinsecCTI Intrinsec, David Sardinha
Trouble in the air: A spree of campaigns targeting the aerospace industry in Russia
DarkWatchman CloudEyE Formbook PhantomCore Remcos
2025-11-26CERT-FRCERT-FR
Mobile phones: Threat landscape since 2015
2025-11-25Universita PegasoLuigi Martire, Pierluigi Paganini
Dissecting a new malspam chain delivering Purelogs infostealer
PureLogs Stealer
2025-11-25Arctic WolfArctic Wolf Labs Team, Jacob Faires
Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine
FAKEUPDATES
2025-11-25kienmanowar Blogm4n0w4r, Tran Trung Kien
[Quick Analysis] Phishing Campaign Fake Tax Authorities to Distribute Malicious Codes
VIP Keylogger
2025-11-24ISH TecnologiaCaique Barqueta, Ícaro César
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer.
2025-11-22Synaptic SecurityRobin Dost
Inside Gamaredon 2025: Zero-Click Espionage at Scale
PteroGraphin Pteranodon
2025-11-22LinkedIn (Idan Tarab)Idan Tarab
India‑Aligned "Dropping Elephant" Pushes a New Stealth Marshalled‑Python Backdoor via MSBuild Dropper in Observed Activity Targeting Pakistan’s Defense Sector
2025-11-21K7 SecurityDhanush, Srinivasan E
Brazilian Campaign: Spreading the Malware via WhatsApp