Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-26Twitter (@ESETresearch)ESET Research
Tweet about PromptLock discovery
PromptLock
2025-08-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7237 targets Taiwanese web hosting infrastructure
SoundBill
2025-08-12Cisco TalosEdmund Brumaghin, Jordyn Dunk
Malvertising campaign leads to PS1Bot, a multi-stage malware framework
PS1Bot
2025-08-01Nextron SystemsPezier Pierre-Henri
Plague: A Newly Discovered PAM-Based Backdoor for Linux
Plague
2025-07-04QianxinRedDrip7
Exclusive disclosure of the attack activities of the APT group “NightEagle”
2025-06-18Cisco TalosVanja Svajcer
Famous Chollima deploying Python version of GolangGhost RAT
GolangGhost PylangGhost GolangGhost
2025-06-12Check Point ResearchCheck Point
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
AsyncRAT Skuld
2025-06-05Cisco TalosAsheer Malhotra, Dmytro Korzhevin, Jacob Finn
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
PathWiper
2025-05-30CensysHimaja Motheram
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
2025-05-28GreynoiseGreyNoise Research
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
2025-05-22Cisco TalosAsheer Malhotra, Brandon White
UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware
Tetra Loader
2025-05-13Cisco TalosAsheer Malhotra, Ashley Shen, Edmund Brumaghin, Vitor Ventura
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-01Recorded FutureInsikt Group, Insikt Group®
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
Terralogger
2025-05-01Recorded FutureInsikt Group
TerraStealerV2 and TerraLogger: Golden Chickens' New Malware Families Discovered
TerraStealer
2025-04-23Cisco TalosAsheer Malhotra, Ashley Shen, Brandon White, Joey Chen, Vitor Ventura
Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
HOLERUN
2025-04-17Cisco TalosJoey Chen
Unmasking the new XorDDoS controller and infrastructure
XOR DDoS
2025-04-14Palo Alto Networks Unit 42Prashil Pattni
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
RN Stealer
2025-03-28Cisco TalosGuilherme Venere
Gamaredon campaign abuses LNK files to distribute Remcos backdoor
Remcos
2025-03-26Cisco TalosCisco Talos
Year in Review
2025-03-25IBM X-ForceGolo Mühr
IBM X-Force discovers new Sheriff Backdoor used to target Ukraine
Deputy Sheriff