Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-09GeniansGenians
Analysis of the Triple Combo Threat of the Kimsuky Group
FlowerPower Appleseed BabyShark
2025-06-06SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware.
VELETRIX Vshell
2025-06-05ReliaquestRELIAQUEST THREAT RESEARCH TEAM
Scattered Spider Targets Tech Companies for Help-Desk Exploitation
2025-06-05ESET ResearchESET Research
BladedFeline: Whispering in the dark
Hawking RDAT Spereal Veaty
2025-06-05Hunt.ioHunt.io
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
AsyncRAT XWorm
2025-06-05FBIFBI
Alert Number: I-060525-PSA - Home Internet Connected Devices Facilitate Criminal Activity
BADBOX
2025-06-05Cisco TalosAsheer Malhotra, Dmytro Korzhevin, Jacob Finn
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
PathWiper
2025-06-05Mobile-Hackermh
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
SpyMax
2025-06-04ThreatrayAbdallah Elshinbary, Jonas Wagner, Konstantin Klinger, Nick Attfield
The Bitter End: Unraveling Eight Years of Espionage Antics – Part Two
AlmondRAT AlmondRAT Artra Downloader BDarkRAT Havoc KiwiStealer KugelBlitz MiyaRAT ORPCBackdoor WmRAT ZxxZ
2025-06-04ProofpointAbdallah Elshinbary, Jonas Wagner, Konstantin Klinger, Nick Attfield
The Bitter End: Unraveling Eight Years of Espionage Antics—Part One
Artra Downloader Havoc
2025-06-03cocomelonccocomelonc
Linux hacking part 5: building a Linux keylogger. Simple C example
2025-06-03ThreatFabricThreatFabric
Crocodilus Mobile Malware: Evolving Fast, Going Global
Crocodilus
2025-06-03VMRayAlbert Zsigovits, VMRay
Rhadamanthys slips through in large installer files
Rhadamanthys
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-06-03ANY.RUNANY.RUN
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals
BeaverTail OtterCookie InvisibleFerret
2025-06-02Aryaka Networksbikash dash, varadharajan krishnasamy
Remcos on the Wire: Analyzing Network Artifacts and C2 Command Structures
Remcos
2025-06-02haxrob.nethaxrob
BPFDoor Part 2 - The Present
BPFDoor
2025-06-02haxrob.nethaxrob
BPFDoor - Part 1 - The past
BPFDoor
2025-05-31Medium (@mvaks)mvaks
Crocodilus in the wild: Mapping the campaign in Poland
Crocodilus
2025-05-31The InsiderChristo Grozev, Michael Weiss, Roman Dobrokhotov
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad