Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-26Arctic WolfArctic Wolf Labs Team
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
GIFTEDCROOK
2025-06-24BridewellBridewell
2025 Cyber Threat Intelligence Report
AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver
2025-06-23GdataKarsten Hahn, Lance Go
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
EvilConwi
2025-06-23RushterArtem Golubin
Threat Hunting Introduction: Cobalt Strike
Cobalt Strike
2025-06-23DarkatlasDarkatlas Squad
Bluenoroff (APT38) Live Infrastructure Hunting
2025-06-21Cert-UACert-UA
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT
BEARDSHELL SLIMAGENT
2025-06-20ValidinKenneth Kinion
Zooming through BlueNoroff Indicators with Validin
2025-06-20Twitter (@threatintel)Threat Intelligence
Tweet about wiper deployed against Albania by Druidfly
2025-06-20Github (VenzoV)VenzoV
Analysis of Amatera Stealer v1 (Test build)
Amatera
2025-06-19Hunt.ioHunt.io
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
Cobalt Strike
2025-06-19Government of CanadaGovernment of Canada
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign
2025-06-19cocomelonccocomelonc
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example
2025-06-18Cisco TalosVanja Svajcer
Famous Chollima deploying Python version of GolangGhost RAT
GolangGhost PylangGhost GolangGhost
2025-06-18Check Point ResearchAntonis Terefos, Jaromír Hořejší
Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data
2025-06-18ElasticSalim Bitam
A Wretch Client: From ClickFix deception to information stealer deployment
HijackLoader Lumma Stealer SectopRAT
2025-06-18Huntress LabsAlden Schmidt, Jonathan Semon, Stuart Ashenbrenner
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
2025-06-17Palo Alto Networks Unit 42Dominik Reichel
Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation
KimJongRat
2025-06-17DARKReadingJames Shank
Operation Endgame: Do Takedowns and Arrests Matter?
BumbleBee Emotet Pikabot SmokeLoader TrickBot
2025-06-16ProofpointJeremy Hedges, Proofpoint Threat Research Team, Tommy Madjar
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication
ACR Stealer Amatera
2025-06-16HarfangLabHarfangLab CTR
SadFuture: Mapping XDSpy latest evolution
XDSpy