Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-04-16SekoiaSekoia TDR
Interlock ransomware evolving under the radar
Interlock Berserk Stealer Interlock Lumma Stealer Supper
2025-04-15Beazley Security LabsBeazley Security Labs
Hunting Mice In Tunnels II - Fake CAPTCHAs and Ransomware
Interlock Supper
2025-04-15Orange CyberdefenseAndré Henschel, Friedl Holzner
CyberSOC Insights: Analysis of a Black Basta Attack Campaign
Black Basta DarkGate Lumma Stealer
2025-04-15sysdigAlessandra Rizzo
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell
SNOWLIGHT Sliver Vshell
2025-04-15SecurityWeekThe Associated Press
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games
2025-04-15CheckpointCheckpoint Research
Renewed APT29 Phishing Campaign Against European Diplomats
GRAPELOADER WINELOADER
2025-04-14TrustwaveDawid Nesterowicz, Pawel Knapczyk
Proton66 Part 1: Mass Scanning and Exploit Campaigns
2025-04-14MorphisecNadav Lorber
New Malware Variant Identified: ResolverRAT Enters the Maze
ResolverRAT
2025-04-14Palo Alto Networks Unit 42Prashil Pattni
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware
RN Stealer
2025-04-14Trend MicroFernando Mercês
BPFDoor’s Hidden Controller Used Against Asia, Middle East Targets
BPFDoor Red Menshen
2025-04-12CyberSecurity88CyberSecurity88
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack
MORH4x
2025-04-11DeXposeM4lcode
Flesh Stealer: A Report on Multivector Data Theft
Flesh Stealer
2025-04-11Bitso Quetzal TeamMauro Eldritch
Interview with the Chollima
BeaverTail OtterCookie InvisibleFerret
2025-04-11ReliaquestRELIAQUEST THREAT RESEARCH TEAM
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique
2025-04-10DomainToolsDomainTools
Newly Registered Domains Distributing SpyNote Malware
SpyNote
2025-04-10cocomelonccocomelonc
Malware and cryptography 41 - encrypt/decrypt payload via TEA. Simple Nim example.
2025-04-10Kaspersky LabsOleg Kupreev
GOFFEE continues to attack organizations in Russia
Owowa GOFFEE
2025-04-10SymantecThreat Hunter Team
Shuckworm Targets Foreign Military Mission Based in Ukraine
2025-04-10Medium TRAC LabsTRAC Labs
Autopsy of a Failed Stealer: StealC v2
Stealc
2025-04-09Digvijay Mane
Beware! Fake ‘NextGen mParivahan’ Malware Returns with Enhanced Stealth and Data Theft