Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-15SymantecThreat Hunter Team
Jewelbug: Chinese APT Group Widens Reach to Russia
2025-09-03DarkrymDarkrym
PXA Stealers Evolution to PureRAT: Part 6 - Finally, the Final Stage PureRAT (Stage 9)
PureRAT
2025-08-31DarkrymDarkrym
PXA Stealers Evolution to PureRAT: Part 3 - Weaponised Python Stage (Stage 5)
PXA Stealer
2025-08-19IBM X-ForceRaymond Joseph Alfonso
IBM X-Force Threat Analysis: QuirkyLoader - A new malware loader delivering infostealers and RATs
QuirkyLoader
2025-06-20K7 SecurityBaran S
SpyMax
SpyMax
2025-06-18ElasticSalim Bitam
A Wretch Client: From ClickFix deception to information stealer deployment
HijackLoader Lumma Stealer SectopRAT
2025-06-12SymantecCarbon Black, Threat Hunter Team
Fog Ransomware: Unusual Toolset Used in Recent Attack
Fog
2025-05-02Arctic WolfArctic Wolf Labs Team
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims
More_eggs
2025-04-25Twitter (@teamcymru_S2)TEAM CYMRU S2 THREAT RESEARCH
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure
2025-04-23Cisco TalosAsheer Malhotra, Ashley Shen, Brandon White, Joey Chen, Vitor Ventura
Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
HOLERUN
2025-04-10SymantecThreat Hunter Team
Shuckworm Targets Foreign Military Mission Based in Ukraine
2025-04-08Team CymruS2 Research Team
Inside DanaBot’s Infrastructure: In Support of Operation Endgame II
DanaBot
2025-04-08TrustwaveNikita Kazymirskyi, Serhii Melnyk
A deep Dive into the Leaked Black Basta Chat Logs
Black Basta Black Basta
2025-02-21cyjaxCymon
How’s that for a malicious Linkc, new group launches DLS
LinkC Pub
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor PlugX ShadowPad Teleboyi
2025-02-20Trend MicroDaniel Lunghi
Updated Shadowpad Malware Leads to Ransomware Deployment
EvilExtractor NailaoLocker PlugX ShadowPad
2025-02-13SymantecThreat Hunter Team
China-linked Espionage Tools Used in Ransomware Attacks
PlugX
2024-12-20Team CymruLewis Henderson
Jingle Shells: How Virtual Offices Enable a Facade of Legitimacy
2024-12-16GdataBanu Ramakrishnan
New I2PRAT communicates via anonymous peer-to-peer network
Unidentified 118
2024-11-11KasperskyAshley Muñoz, Cristian Souza, Eduardo Ovalle
Ymir: new stealthy ransomware in the wild
Ymir