Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-09-16ProofpointGreg Lesnewich, Mark Kelly, Nick Attfield, Proofpoint Threat Research Team
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels
2025-09-16InfobloxInfoblox Threat Intelligence Group
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network
2025-09-15Huntress LabsChad Hudson, Michael Elford
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords
Akira
2025-09-15ZscalarThreatLabZ research team
SmokeLoader Rises From the Ashes
SmokeLoader
2025-09-09ThreatFabricThreatFabric
The Rise of RatOn: From NFC heists to remote control and ATS
RatOn
2025-09-04SentinelOneAleksandar Milenkoski, Kenneth Kinion, Sreekar Madabushi
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
ContagiousDrop
2025-09-04eSentireeSentire Threat Response Unit (TRU)
New Botnet Emerges from the Shadows: NightshadeC2
NightshadeC2 NightshadeC2
2025-08-28DefentiveDefentive Threat Research
The Phantom Threat: Inside UNC5518’s Invisible Empire of MetaStealer Operations
MetaStealer
2025-08-27AnthropicAnthropic
Anthropic - Threat Intelligence Report: August 2025
BeaverTail OtterCookie GolangGhost InvisibleFerret GolangGhost
2025-08-27DefentiveDefentive Threat Research
Anatomy of a Real Phishing Attack: How Defentive Detected and Stopped It in Action
2025-08-26SophosSophos Counter Threat Unit Research Team
Velociraptor incident response tool abused for remote access
2025-08-25GoogleGoogle Threat Intelligence Group
Deception in Depth: PRC-Nexus Espionage Campaign Hijacks Web Traffic to Target Diplomats
STATICPLUGIN
2025-08-21GBHackers on SecurityAman Mishra
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
TamperedChef
2025-08-21TrellixSagar Bade
The Silent, Fileless Threat of VShell
Vshell
2025-08-21CrowdStrikeCounter Adversary Operations
MURKY PANDA: A Trusted-Relationship Threat in the Cloud
2025-08-19IBM X-ForceRaymond Joseph Alfonso
IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs
QuirkyLoader
2025-08-18Medium RaghavtiResearchBeGoodToAll
Qilin Ransomware-as-a-Service: Threat Analysis and Strategic Outlook
Qilin AgendaCrypt
2025-08-13IntezerNicole Fishbein
Threat Bulletin: Fire in the Woods – A New Variant of FireWood
FireWood
2025-08-05DefentiveDefentive Threat Research
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT
Ghost RAT
2025-08-01Reverse The MalwareDiyar Saadi
Threat Hunting with 20 Urlscan.io Search Queries