Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-04-15SecurityWeekThe Associated Press
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
NCSC and partners share guidance for communities at high risk of digital surveillance
badbazaar
2025-04-07The RecordDaryna Antoniuk
Flaw in ESET security software used to spread malware from ToddyCat group
2025-03-18WeLiveSecurityDominik Breitenbacher
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
Anel AsyncRAT
2025-03-11Juniper NetworksCybersecurity R&D
The RedPenguin Malware Incident
tsh
2025-02-28KrebsOnSecurityBrian Krebs
Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
FAKEUPDATES GootLoader
2025-02-27Securite360.netMuffin
How Long Can a Vulnerable Server Stay Clean on the Internet? A Honeypot Tale
RedTail
2025-02-26POLITICOAntoaneta Roussi
Chinese hackers siphoned off Belgian state security emails, report says
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24K7 SecuritySuresh Reddy
LCRYX Ransomware: How a VB Ransomware Locks Your System
LCRYX
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities
2025-02-11Github (SecurityBlueTeam)Security Blue Team
Smartloader Wireshark plugin
SmartLoader
2025-02-11CyberSecurityNewsDo Son
Sandworm APT Exploits Trojanized KMS Tools to Target Ukrainian Users in Cyber Espionage Campaign
DCRat
2025-02-06SecuriPuja Srivastava
Google Tag Manager Skimmer Steals Credit Card Info From Magento Site
magecart
2025-01-29SecurityScorecardSecurityScorecard STRIKE Team
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
BeaverTail InvisibleFerret
2025-01-27SecurityScorecardSTRIKE Team
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign
2025-01-21Financial Security InstituteJeongGak Lyu
Follow the Clues - Everyday is lazarus.day