Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-28ThreatFabricThreatFabric
New Android Malware Herodotus Mimics Human Behaviour to Evade Detection
2025-10-28KasperskyOmar Amin, Sojun Ryu
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
2025-10-27Trend MicroEmmanuel Panopio, Jeffrey Francis Bonaobra, Joe Soares
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C
Water Saci
2025-10-27Ransom-ISACEllis Stannard
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 2)
JADESNOW
2025-10-27BartBlaze
Earth Estries alive and kicking
2025-10-27KasperskyBoris Larin
Mem3nt0 mori – The Hacking Team is back!
Dante
2025-10-25MandarNaik016Mandar Naik
Malware Analysis - VIP Keylogger - Part 2
VIP Keylogger
2025-10-23ESET ResearchAlexis Rapin, Peter Kálnai
Gotta fly: Lazarus targets the UAV sector
BURNBOOK QuanPinLoader ScoringMathTea
2025-10-23Twitter (@salmanvsf)Salman Shaikh
Tweet about Discovery of Smile PaaS admin panel
2025-10-22Multilateral Sanctions Monitoring TeamMultilateral Sanctions Monitoring Team
The DPRK's Violation and Evasion of UN Sanctions through Cyber and Information Technology Worker Activities
2025-10-22Trend MicroDaniel Lunghi, Joseph C Chen, Lenart Bermejo, Leon M Chang, Vickie Su
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
Cobalt Strike DracuLoader ShadowPad
2025-10-22SentinelOneTom Hegel
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
Princess
2025-10-22CyderesRahul Ramesh
Chrome Installer Impersonation Campaign Targets China-Based Victims with ValleyRAT Trojan
BlindEDR ValleyRAT
2025-10-21HarfangLabHarfangLab CTR
RudePanda owns IIS servers like it's 2003
TOLLBOOTH
2025-10-21ElasticAndrew Pease, Braxton Williams, Daniel Stepanic, Jia Yu Chan, Salim Bitam, Seth Goodwin
TOLLBOOTH: What's yours, IIS mine
TOLLBOOTH
2025-10-20DarktraceNathaniel Jones, Sam Lister
Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion
SNAPPYBEE
2025-10-20Medium Deriv-TechShantanu Ghumade
How a fake AI recruiter delivers five staged malware disguised as a dream job
BeaverTail OtterCookie InvisibleFerret
2025-10-20GoogleWesley Shields
To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER
MAYBEROBOT NOROBOT YESROBOT
2025-10-20Ransom-ISACEllis Stannard
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1)
JADESNOW
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz