Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-13Israel National Digital AgencyAdi Pick, Hila David, Idan Beit-Yosef, Shimi Cohen, Yaniv Goldman
SpearSpecter: Unmasking Iran’s IRGC Cyber Operations Targeting High-Profile Individuals
TAMECAT
2025-11-10GeniansGenians
State-Sponsored Remote Wipe Tactics Targeting Android Devices
Quasar RAT Remcos
2025-11-05Huntress LabsAnna Pham
Gootloader Returns: What Goodies Did They Bring?
GootLoader Supper
2025-11-05ESET ResearchESET Research
APT Activity: Russia-Aligned APTs Ramp Up Attacks Against Ukraine and Its Strategic Partners (April 2025 – September 2025 Report)
2025-11-04The RecordJonathan Greig
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme
2025-11-04Twitter (@nextronresearch)Nextron Threat Research Team
Tweet about BQT ransomware on Linux
BQTlock
2025-11-03SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation Peek-a-Baku: Silent Lynx APT makes sluggish shift to Dushanbe
Laplas (Reverseshell) SilentSweeper
2025-11-02SymantecBroadcom, Symantec
Multi-Stage In-Memory Agent Tesla Campaign Targets LATAM
Agent Tesla
2025-10-31SeqriteSathwik Ram Prakki
Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus
2025-10-31ExpelAARON WALTON
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates
Broomstick
2025-10-29QianxinAcey9, Alex.Turing
Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed
PolarEdge
2025-10-28ThreatFabricThreatFabric
New Android Malware Herodotus Mimics Human Behaviour to Evade Detection
2025-10-22Trend MicroDaniel Lunghi, Joseph C Chen, Lenart Bermejo, Leon M Chang, Vickie Su
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
Cobalt Strike DracuLoader ShadowPad
2025-10-22SentinelOneTom Hegel
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
Princess
2025-10-22CyderesRahul Ramesh
Chrome Installer Impersonation Campaign Targets China-Based Victims with ValleyRAT Trojan
BlindEDR ValleyRAT
2025-10-21ElasticAndrew Pease, Braxton Williams, Daniel Stepanic, Jia Yu Chan, Salim Bitam, Seth Goodwin
TOLLBOOTH: What's yours, IIS mine
TOLLBOOTH
2025-10-20DarktraceNathaniel Jones, Sam Lister
Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion
SNAPPYBEE
2025-10-20GoogleWesley Shields
To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
MAYBEROBOT NOROBOT YESROBOT
2025-10-20Ransom-ISACEllis Stannard
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1)
JADESNOW
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz