Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-16Cisco TalosMichael Kelley, Vanja Svajcer
BeaverTail and OtterCookie evolve with a new Javascript module
BeaverTail OtterCookie InvisibleFerret
2025-10-15Palo Alto Networks Unit 42paloalto Networks: Unit42
PhantomVAI Loader Delivers a Range of Infostealers
Katz Stealer PhantomVAI
2025-10-15SymantecThreat Hunter Team
Jewelbug: Chinese APT Group Widens Reach to Russia
REF7707
2025-10-15David DoddaDvaid Dodda
How I Almost Got Hacked By A 'Job Interview'
OtterCookie
2025-10-15KasperskyNoushin Shabab, Ye Jin
Mysterious Elephant: a growing threat
Remcos
2025-10-15NTTRintaro Koike
OtterCandy, malware used by WaterPlum
OtterCandy
2025-10-15Trend MicroDove Chiu, Lucien Chuang
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits
2025-10-14CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Adversaries Target Ukrainian Defence Forces and Local Authorities Using "Counter-Sabotage" Lure
UAC-0239
2025-10-14SynacktivTheo Letailleur
LinkPro: eBPF rootkit analysis
LinkPro
2025-10-14SynacktivTheo Letailleur
LinkPro: analysis of an eBPF rootkit
LinkPro vGet
2025-10-14ReliaquestRELIAQUEST THREAT RESEARCH TEAM
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise
2025-10-14GatewatcherGatewatcher, Gatewatcher's purple team
Data Breach: the operations of "Charming Kitten" revealed
2025-10-13LogpressoHwang Min-kyung
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS
2025-10-13SpyCloudSpyCloud Labs Research Team
More Than Meets the YY: Analyzing the YYlaiyu PhaaS Panel
2025-10-13NCSC UKNCSC UK
Malware Analysis Report: RayInitiator & LINE VIPER
2025-10-13ProofpointKyle Cucci, Proofpoint Threat Research Team, Selena Larson, Tommy Madjar
When the monster bytes: tracking TA585 and its arsenal
MonsterV2
2025-10-10Security AffairsPierluigi Paganini
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-10-10ReversingLabsKarlo Zanki
Shai-hulud npm attack: What you need to know
Shai-Hulud
2025-10-10KrebsOnSecurityBrian Krebs
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
Aisuru
2025-10-10MalcatRenaud Tabary
Malcat scripting tutorial: deobfuscating Latrodectus
Latrodectus