Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM
2025-12-02Positive TechnologiesIgor Shiryaev, Kirill Navoshchik, Maxim Shamanov, Stanislav Pyzhov, Vladislav Lunin
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025
2025-11-26CERT-FRCERT-FR
Mobile phones: Threat landscape since 2015
2025-11-24ISH TecnologiaCaique Barqueta, Ícaro César
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer.
2025-11-22Synaptic SecurityRobin Dost
Inside Gamaredon 2025: Zero-Click Espionage at Scale
PteroGraphin Pteranodon
2025-11-21K7 SecurityDhanush, Srinivasan E
Brazilian Campaign: Spreading the Malware via WhatsApp
2025-11-20ValidinValidin
Inside DPRK’s Fake Job Platform Targeting U.S. AI Talent
2025-11-20GoogleDan Perez, Harsh Parashar, Tierra Duncan
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
BADAUDIO Cobalt Strike
2025-11-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
BURNBOOK MISTPEN
2025-11-20ThreatFabricThreatFabric
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
Sturnus
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-19SpamhausJonas Arnold
The anatomy of bulletproof hosting – past, present, future
2025-11-19SecurityScorecardGilad Friedenreich Maizles, Marty Kareem
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-11-18Cert-UACert-UA
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329)
GAMYBEAR
2025-11-170x0d4y0x0d4y
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea
ScoringMathTea
2025-11-15ElasticJia Yu Chan, Salim Bitam
RONINGLOADER: DragonBreath’s New Path to PPL Abuse
DragonBreath RONINGLOADER
2025-11-14The RecordJonathan Greig
Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million
2025-11-13Politie NLPolitie NL
Again criminal infrastructure dismantled in international ransomware operation
Rhadamanthys Venom RAT