Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-14K7 SecurityUma Madasamy
SpectraRansomware
Chaos
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-05-22KrebsOnSecurityBrian Krebs
Oops: DanaBot Malware Devs Infected Their Own PCs
DanaBot
2025-05-20KrebsOnSecurityBrian Krebs
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
AIRASHI Aisuru
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-07NTT SecurityMasaya Motoda, Rintaro Koike
Additional Features of OtterCookie Malware Used by WaterPlum
BeaverTail OtterCookie InvisibleFerret
2025-05-06NCSC SwitzerlandNCSC Switzerland
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II
2025-05-05Security ChuSecurity Chu
Negotiations with the Akira ransomware group: an ill-advised approach
Akira Akira
2025-04-30Google Cloud CommunityPraveeth DSouza
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations
Lumma Stealer
2025-04-30MalwarebytesPieter Arntz
Fake Social Security Statement emails trick users into installing remote tool
Molatori
2025-04-28SentinelOneAleksandar Milenkoski, Jim Walter, Tom Hegel
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries
PurpleHaze
2025-04-24Positive TechnologiesPT Expert Security Center
Crypters And Tools. Part 2: Different Paws — Same Tangle
2025-04-16IBM X-ForceIBM Security X-Force Team
IBM X-Force 2025 Threat Intelligence Index
2025-04-15Beazley Security LabsBeazley Security Labs
Hunting Mice In Tunnels II - Fake CAPTCHAs and Ransomware
Interlock Supper
2025-04-15SecurityWeekThe Associated Press
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games
2025-04-12CyberSecurity88CyberSecurity88
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack
MORH4x
2025-04-09ResecurityResecurity
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach
Jabaroot
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
NCSC and partners share guidance for communities at high risk of digital surveillance
badbazaar