Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-04Twitter (@nextronresearch)Nextron Threat Research Team
Tweet about BQT ransomware on Linux
BQTlock
2025-10-15SymantecThreat Hunter Team
Jewelbug: Chinese APT Group Widens Reach to Russia
2025-10-14ReliaquestRELIAQUEST THREAT RESEARCH TEAM
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise
2025-10-13LogpressoHwang Min-kyung
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS
2025-10-13ProofpointKyle Cucci, Proofpoint Threat Research Team, Selena Larson, Tommy Madjar
When the monster bytes: tracking TA585 and its arsenal
MonsterV2
2025-10-07Rapid7Jakub Zvarik
Crimson Collective: A New Threat Group Observed Operating in the Cloud
2025-10-07Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
Vietnamese Threat Group Uses Vampire Bot to Target Digital Professionals
Vampire Bot
2025-10-06MicrosoftMicrosoft Threat Intelligence
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
MedusaLocker
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-10-01heavyscientist
Aisuru DDoS Campaign: Threat Intelligence Assessment
Aisuru
2025-09-30InfobloxInfoblox Threat Intelligence Group
Detour Dog: DNS Malware Powers Strela Stealer Campaigns
StrelaStealer
2025-09-16ProofpointGreg Lesnewich, Mark Kelly, Nick Attfield, Proofpoint Threat Research Team
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels
2025-09-16InfobloxInfoblox Threat Intelligence Group
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network
2025-09-15DeXposeM4lcode
Threat Actor Profile: APT27
2025-09-15Huntress LabsChad Hudson, Michael Elford
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords
Akira
2025-09-04SentinelOneAleksandar Milenkoski, Kenneth Kinion, Sreekar Madabushi
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
ContagiousDrop
2025-09-04eSentireeSentire Threat Response Unit (TRU)
New Botnet Emerges from the Shadows: NightshadeC2
NightshadeC2 NightshadeC2
2025-08-28DefentiveDefentive Threat Research
The Phantom Threat: Inside UNC5518’s Invisible Empire of MetaStealer Operations
MetaStealer
2025-08-27AnthropicAnthropic
Anthropic - Threat Intelligence Report: August 2025
BeaverTail OtterCookie GolangGhost InvisibleFerret GolangGhost
2025-08-27DefentiveDefentive Threat Research
Anatomy of a Real Phishing Attack: How Defentive Detected and Stopped It in Action