Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-21TrendmicroJunestherry Dela Cruz
TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead
Stealc Vidar
2025-05-21Twitter (@VMRay)VMRay
Tweet about Akemi
Akemi
2025-05-21DatadogAndy Giron, Eslam Salem, Ian Kretz, Tesnim Hamdouni
The obfuscation game: MUT-9332 targets Solidity developers via malicious VS Code extensions
Unidentified 122 (Stealer)
2025-05-21Bleeping ComputerBill Toulas
Russia to enforce location tracking app on all foreigners in Moscow
2025-05-20KasperskyAMR
https://securelist.ru/purerat-attacks-russian-organizations/112619/
PureRAT
2025-05-20KrebsOnSecurityBrian Krebs
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
AIRASHI Aisuru
2025-05-20AcronisJozsef Gegeny, Prakas Thevendaran, Santiago Pontiroli
From banks to battalions: SideWinder’s attacks on South Asia’s public sector
2025-05-19cocomelonccocomelonc
AIYA - Mobile malware development book. First edition
AndroRAT Anubis CraxsRAT Dendroid FakeGram Hydra IPStorm SpyNote
2025-05-19CSAAhmad Abdillah
Reversing a Microsoft-Signed Rootkit: The Netfilter Driver
NetfilterRootkit
2025-05-19RalfHacker
GitHub - Adaptix-Framework//AdaptixC2
AdaptixC2
2025-05-17Denwp ResearchTonmoy Jitu
More_Eggs? A Venom Spider Backdoor Targeting HR
More_eggs
2025-05-16AhnLabASEC
DBatLoader (ModiLoader) Being Distributed to Turkish Users
DBatLoader
2025-05-16GdataKarsten Hahn
Printer company provided infected software downloads for half a year
SnipVex
2025-05-14LACYoshihiro Ishikawa
Continued EAGERBEE (Thumtais) malware activity
EagerBee
2025-05-13Trend MicroPhilip Chen, Pierre Lee, Vickie Su
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
2025-05-13ProofpointGreg Lesnewich, Mark Kelly, Saher Naumaan
TA406 Pivots to the Front
2025-05-13EclecticIQArda Büyükkaya
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
KrustyLoader SNOWLIGHT Vshell
2025-05-13Cisco TalosAsheer Malhotra, Ashley Shen, Edmund Brumaghin, Vitor Ventura
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-13CSAAhmad Abdillah
Intrusion Insights Straight from Leaked Operator Chats
LockBit LockBit LockBit
2025-05-12SynacktivMaxence Fossat
Open-source toolset of an Ivanti CSA attacker
HTran iox reGeorg