Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russian Cyber Operations
WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer
2025-09-07Hexastrike CybersecurityMaurice Fielenbach
ValleyRAT Exploiting BYOVD to Kill Endpoint Security
ValleyRAT
2025-09-04SentinelOneAleksandar Milenkoski, Kenneth Kinion, Sreekar Madabushi
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
ContagiousDrop
2025-08-21Swiss Post CybersecurityLouis Schürmann
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer
donut_injector
2025-08-12bluecyberKhắc Minh
Analysis of a ClickFix malware attack
Vidar
2025-08-10DEFCON 33Seongsu Park
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors
2025-07-30RUSILouise Marie Hurel
What Singapore's First Public Cyber Attribution Tells Us
2025-07-28Kyiv IndependentMartin Fornusek
Hacker group claims responsibility for cyberattack on Russia's Aeroflot
2025-07-27Cyber Intelligence InsightsVasilis Orlof
Bulletproof Hosting Hunt: Connecting the dots from Lumma to Qwins Ltd (ASN 213702)
Lumma Stealer
2025-07-27Medium RaghavtiResearchBeGoodToAll
Lumma Stealer — A Proliferating Threat in the Cybercrime Landscape
Lumma Stealer
2025-07-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
The Operational Blueprint of Kimsuky APT for Cyber Espionage
Kimsuky
2025-07-23bluecyberSon Vu
APT32 Malware: An In-Depth Analysis
OceanLotus
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
2025-07-19The RegisterJessica Lyons
Ex-IDF cyber chief on Iran, Scattered Spider, and why social engineering worries him more than 0-days
2025-07-18WiredKim Zetter
How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
2025-07-18Kyiv IndependentAndrea Januta, Anna Fratsyvir
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says