Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-09Red CanaryChris Brook, Tony Lambert
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
AMOS Odyssey Stealer Poseidon Stealer
2025-10-08CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
New cyber threats: who and how to attack enemy groups
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-06MicrosoftMicrosoft Threat Intelligence
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
Medusa Storm-1175
2025-10-06BlackPointCaden Toellner, Nevan Beal, Sam Decker
Malicious Node Package Deploys OtterCookie
OtterCookie
2025-10-03TechzineErik van Klinken
What we know so far about Red Hat’s GitLab instance breach
Crimson Collective
2025-10-02Medium BI.ZONEBI.ZONE
Cavalry Werewolf raids Russia’s public sector with trusted relationship attacks
FoalShell StallionRAT YoroTrooper
2025-10-02TrellixNiranjan Hegde, Sijo Jacob
XWorm V6: Exploring Pivotal Plugins
XWorm
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-10-01NetScoutASERT Team
Keymous+ Threat Actor Profile
Keymous+
2025-09-30kuxhagraKushagra Sarathe
that one time i got hacked: a security incident breakdown
JADESNOW
2025-09-30BloombergEmily Forgash
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30SynthientSynthient
GhostSocks: From Initial Access to Residential Proxy
GhostSocks Lumma Stealer
2025-09-26BlackPointNevan Beal, Sam Decker
Malicious Teams Installers Drop Oyster Malware
Broomstick
2025-09-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
BatShadow: Vietnamese Threat Actor Expands Its Digital Operations
Vampire Bot BatShadow
2025-09-25Trend MicroJacob Santos, Sarah Pearl Camiling
New LockBit 5.0 Targets Windows, Linux, ESXi
LockBit LockBit
2025-09-25Koi SecurityIdan Dardikman
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails
2025-09-24TEAMT5Still Hsu, Tim Chen
Google Calendar As C2 Infrastructure: A China-Nexus Campaign With Stealthy Tactics
TOUGHPROGRESS