Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-15Bleeping ComputerSergiu Gatlan
French Interior Ministry confirms cyberattack on email servers
2025-12-12TagesschauMarkus Sambale, Philipp Eckstein
German government summons Russian ambassador
2025-12-11Trend MicroDaniel Lunghi, Feike Hacquebord, Ian Kenefick
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics
ROMCOM RAT
2025-12-11MalwarebytesPieter Arntz
Another Chrome zero-day under attack: update now
2025-12-10The RecordJonathan Greig
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure
2025-12-10Check Point ResearchCheck Point Research, Jiří Vinopal
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
ValleyRAT
2025-12-10Trend MicroAshish Verma, Deep Patel, Jack Walsh, Lucas Silva, Peter Girnus
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation
2025-12-10LinkedIn (Idan Tarab)Idan Tarab
Lifting the Shadow: APT-C-35’s Living Web Footprint
2025-12-10zimperiumVishnu Pratapagiri
Total Takeover: DroidLock Hijacks Your Device
DroidLock
2025-12-10NetresecErik Hjelmvik
Latrodectus BackConnect
IcedID Keyhole Latrodectus
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Environmental Protection AgencyEPA Press Office
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Reverse The MalwareDiyar Saadi
Debunking a Malware Technique That Bypasses Binwalk Using dd
2025-12-09BlackPointSam Decker
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
CASTLELOADER
2025-12-09Huntress LabsJonathan Semon, Stuart Ashenbrenner
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok
AMOS
2025-12-08KrollAlessio Ragazzi, Dave Waugh, Mikesh Nagar
New AMOS Infection Vector Highlights Risks around AI Adoption
AMOS
2025-12-08Trend MicroAliakbar Zahravi
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows
GhostPenguin
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey