Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-22Synaptic SecurityRobin Dost
Inside Gamaredon 2025: Zero-Click Espionage at Scale
PteroGraphin Pteranodon
2025-11-21K7 SecurityDhanush, Srinivasan E
Brazilian Campaign: Spreading the Malware via WhatsApp
2025-11-19SecurityScorecardGilad Friedenreich Maizles, Marty Kareem
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign
2025-11-05KrebsOnSecurityBrian Krebs
Cloudflare Scrubs Aisuru Botnet from Top Domains List
Aisuru
2025-10-28KrebsOnSecurityBrian Krebs
Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz
2025-10-18Koi SecurityIdan Dardikman
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
GlassWorm
2025-10-10KrebsOnSecurityBrian Krebs
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
Aisuru
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-09-30K7 SecurityUma Madasamy
PatchWork APT
2025-09-25Koi SecurityIdan Dardikman
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails
2025-09-07Hexastrike CybersecurityMaurice Fielenbach
ValleyRAT Exploiting BYOVD to Kill Endpoint Security
ValleyRAT
2025-08-27StepSecurityAnish Kurmi
Supply Chain Security Alert: Popular Nx Build System Package Compromised with Data-Stealing Malware
s1ngularity Stealer
2025-08-22K7 SecurityHarihara Sudhan
Examining the tactics of BQTLOCK Ransomware & its variants
BQTlock
2025-08-21GBHackers on SecurityAman Mishra
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
TamperedChef
2025-08-21Swiss Post CybersecurityLouis Schürmann
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer
donut_injector
2025-08-08K7 SecurityAzhagan K M S
Silent Watcher: Dissecting Cmimai Stealer’s VBS Payload
Cmimai Stealer
2025-08-04Beazley Security LabsAlex Delamotte, Bobby Venal, Francisco Donoso, Jim Walter, Sam Mayers, Tell Hause
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
PXA Stealer
2025-07-30GBHackers on SecurityLucas Mancilha
Lazarus Group enhances malware delivery by using new techniques
OtterCookie