Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-25Arctic WolfArctic Wolf Labs Team, Jacob Faires
Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine
FAKEUPDATES
2025-11-25kienmanowar Blogm4n0w4r, Tran Trung Kien
[Quick Analysis] Phishing Campaign Fake Tax Authorities to Distribute Malicious Codes
VIP Keylogger
2025-11-24ISH TecnologiaCaique Barqueta, Ícaro César
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer.
2025-11-22Synaptic SecurityRobin Dost
Inside Gamaredon 2025: Zero-Click Espionage at Scale
PteroGraphin Pteranodon
2025-11-22LinkedIn (Idan Tarab)Idan Tarab
India‑Aligned "Dropping Elephant" Pushes a New Stealth Marshalled‑Python Backdoor via MSBuild Dropper in Observed Activity Targeting Pakistan’s Defense Sector
2025-11-21K7 SecurityDhanush, Srinivasan E
Brazilian Campaign: Spreading the Malware via WhatsApp
2025-11-20ValidinValidin
Inside DPRK’s Fake Job Platform Targeting U.S. AI Talent
2025-11-20GoogleDan Perez, Harsh Parashar, Tierra Duncan
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks
BADAUDIO Cobalt Strike
2025-11-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
BURNBOOK MISTPEN
2025-11-20ThreatFabricThreatFabric
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
Sturnus
2025-11-19NetAskari SubstackNetAskari
Critical strike: China's hacking training grounds (PART 1)
2025-11-19Natto ThoughtsEugenio Benincasa, Natto Team
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-19SpamhausJonas Arnold
The anatomy of bulletproof hosting – past, present, future
2025-11-19SecurityScorecardGilad Friedenreich Maizles, Marty Kareem
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-11-18DataBreaches.netDissent
From bad to worse: Doctor Alliance hacked again by same threat actor (2)
Kazu
2025-11-18Cert-UACert-UA
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329)
GAMYBEAR UAC-0241
2025-11-17The HIPAA JournalSteve Alder
Doctor Alliance Investigating 353 GB Data Theft Claim
Kazu
2025-11-17AhnLabASEC Analysis Team
NKNShell Malware Distributed via VPN Website
Larva-24010