Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-26Reverse The MalwareDiyar Saadi
Forensic Artifacts for User Windows History Activity
2025-07-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
The Operational Blueprint of Kimsuky APT for Cyber Espionage
Kimsuky
2025-07-25CloudsekCloudsek
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware
Epsilon Red
2025-07-24SYGNIASygnia Team
Fire Ant: A Deep-Dive into Hypervisor-Level Espionage
2025-07-24The Washington TimesBill Gertz
Hackers breach intelligence website used by CIA
2025-07-24Bleeping ComputerSergiu Gatlan
BlackSuit ransomware extortion sites seized in Operation Checkmate
BlackSuit Royal Ransom BlackSuit Mount Locker Royal Ransom
2025-07-24Dr.WebDr.Web
Gamers, get ready: scammers disguise cryptocurrency and password-stealing Scavenger trojans as cheats and mods
Scavenger
2025-07-24Red CanaryThe Red Canary Team
Intelligence Insights: July 2025
Broomstick
2025-07-23Cato NetworksVitaly Simonovich
Cato CTRL™ Threat Research: Analyzing LAMEHUG – First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)
LAMEHUG
2025-07-23bluecyberSon Vu
APT32 Malware: An In-Depth Analysis
OceanLotus
2025-07-23CatalystCatalyst
Understanding Current CastleLoader Campaigns
CASTLELOADER
2025-07-23OPFOR JournalOPFOR Journal
Singapore Takes Unprecedented Military Action Against Chinese State-Sponsored Hackers
2025-07-23Stranded on Pylos BlogJoe Slowik
Will the Real Salt Typhoon Please Stand Up?
KV
2025-07-23MandiantMandiant Incident Response
From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
2025-07-22Recorded FutureInsikt Group®
Anatomy of DDoSia: NoName057(16)'s DDoS Infrastructure and Targeting
Dosia
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603
2025-07-22AkamaiTomer Peled
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
2025-07-21LookoutAlemdar Islamoglu, Justin Albrecht
Lookout Discovers Iranian APT MuddyWater Leveraging DCHSpy During Israel-Iran Conflict
DHCSpy
2025-07-21AhnLabASEC
RokRAT Malware Using Malicious Hangul (.HWP) Documents
RokRAT