Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-26Arctic WolfArctic Wolf Labs Team
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
GIFTEDCROOK
2025-06-23PolySwarm Tech TeamThe Hivemind
Famous Chollima’s PylangGhost
GolangGhost PylangGhost GolangGhost
2025-06-16ProofpointJeremy Hedges, Proofpoint Threat Research Team, Tommy Madjar
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication
ACR Stealer Amatera
2025-06-16SecurityScorecardSTRIKE Team
Checking all the Boxes: LapDogs, The New ORB in Town
ShortLeash ShortLeash
2025-06-15Positive TechnologiesStanislav Pyzhov, Vladislav Lunin
Team46 and TaxOff: two sides of the same coin
Cobalt Strike
2025-06-12SymantecCarbon Black, Threat Hunter Team
Fog Ransomware: Unusual Toolset Used in Recent Attack
Fog
2025-06-09ZscalerThreatLabZ research team, Zscaler
DanaBleed: DanaBot C2 Server Memory Leak Bug
DanaBot
2025-05-19The DFIR Report0xtornado, pcsc0ut, Randy Pargman
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Mimic Ransomware MimiKatz
2025-05-14ZscalerThreatLabZ research team
Technical Analysis of TransferLoader
TransferLoader
2025-05-02Arctic WolfArctic Wolf Labs Team
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims
More_eggs
2025-05-01FortinetFaisal Abdul Malik Qureshi, Fred Gutierrez, Hossein Jazi, John Simmons, Mark Robson, Said Wali, Xiaopeng Zhang
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure
Havoc
2025-05-01ZscalerThreatLabZ research team
I StealC You: Tracking the Rapid Changes To StealC
Stealc
2025-04-28CensysThe Censys Research Team
Scouting a Threat Actor
2025-04-25Twitter (@teamcymru_S2)TEAM CYMRU S2 THREAT RESEARCH
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure
2025-04-16IBM X-ForceIBM Security X-Force Team
IBM X-Force 2025 Threat Intelligence Index
2025-04-11Bitso Quetzal TeamMauro Eldritch
Interview with the Chollima
BeaverTail OtterCookie InvisibleFerret
2025-04-11ReliaquestRELIAQUEST THREAT RESEARCH TEAM
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique
2025-04-10SymantecThreat Hunter Team
Shuckworm Targets Foreign Military Mission Based in Ukraine
2025-04-08Team CymruS2 Research Team
Inside DanaBot’s Infrastructure: In Support of Operation Endgame II
DanaBot
2025-04-03ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report