Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-30Cyfirmacyfirma
APT36 : Multi-Stage LNK Malware Campaign Targeting Indian Government Entities
2025-12-30Koi SecurityGal Hachamov, Tuval Admoni
DarkSpectre: Unmasking the Threat Actor Behind 8.8 Million Infected Browsers
DarkSpectre ShadyPanda
2025-12-30US Department of JusticeOffice of Public Affairs
Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware
BlackCat BlackCat
2025-12-30abuse.chabuse.ch
MalwareBazaar | XoriumStealer
XoriumStealer
2025-12-30abuse.chabuse.ch
MalwareBazaar | MaskGramStealer
MaskGramStealer
2025-12-29LinkedIn (Idan Tarab)Idan Tarab
Active Spear-Phishing Campaign Targeting Israeli Security-Related Individuals — Infrastructure Linked to APT42 (Hashtag#CharmingKitten)
2025-12-28Twitter (@CharlieEriksen)Charlie Eriksen
Tweet about sightings of a new Shai Hulud version
Shai-Hulud
2025-12-27bluecyberNigmaz
APT Earth Baxia - Charon Ransomware: An In-Depth Analysis
Charon
2025-12-25Github (cocomelonc)cocomelonc
Malware development trick 55: enum process via NtQuerySystemInformation. Simple C example.
2025-12-25abuse.chabuse.ch
MalwareBazaar | DeerStealer
DeerStealer
2025-12-25abuse.chabuse.ch
MalwareBazaar | SVCStealer
SVCStealer
2025-12-24CloudsekKoushik Pal, somedieyoungZZ
Silver Fox Targeting India Using Tax Themed Phishing Lures
ValleyRAT Winos
2025-12-23secpodSantosh Sethuraman
Zero-Day Crisis: CVE-2025-20393 Unpatched on Cisco Email Gateways, Exploited by China-Linked Hackers
UAT-9686
2025-12-22Medium Ireneusz TarnowskiIreneusz Tarnowski
Operational Analysis of Communication Channels in Mobile RCS
SpyFRPTunnel
2025-12-21GeniansGenians
Operation Artemis: Analysis of HWP-Based DLL Side Loading Attacks
RokRAT
2025-12-19BotbrawlSean Doyle
Chinese APT LongNosedGoblin Targets Government Networks in Southeast Asia and Japan
NosyDownloader LongNosedGoblin
2025-12-19IntezerNicole Fishbein
Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs
EchoGather
2025-12-19cybleCyble
Stealth in Layers: Unmasking the Loader used in Targeted Email Campaigns
DCRat Katz Stealer PhantomVAI PureLogs Stealer Remcos XWorm
2025-12-18ProofpointProofpoint Threat Research Team
Access granted: phishing with device code authorization for account takeover
TA2723 UNK_AcademicFlare
2025-12-18HelpNetSecurityJohn Wilson
Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
Scripted Sparrow