Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-10McAfeeHarshil Patel, Prabudh Chakravorty
Astaroth: Banking Trojan Abusing GitHub for Resilience
Astaroth
2025-10-10Security AffairsPierluigi Paganini
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-10-10ReversingLabsKarlo Zanki
Shai-hulud npm attack: What you need to know
Shai-Hulud
2025-10-10KrebsOnSecurityBrian Krebs
DDoS Botnet Aisuru Blankets US ISPs in Record DDoS
Aisuru
2025-10-10MalcatRenaud Tabary
Malcat scripting tutorial: deobfuscating Latrodectus
Latrodectus
2025-10-10SocketKirill Boychenko
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
BeaverTail InvisibleFerret
2025-10-10GatewatcherGatewatcher's purple team
Fuite de données: les opérations de "Charming Kitten" révélées
2025-10-09MicrosoftMicrosoft Threat Intelligence
Investigating targeted “payroll pirate” attacks affecting US universities
Storm-2657
2025-10-09Red CanaryChris Brook, Tony Lambert
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
AMOS Odyssey Stealer Poseidon Stealer
2025-10-08CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
New cyber threats: who and how to attack enemy groups
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-10-08VolexityCallum Roxan, Killian Raimbaud, Steven Adair
APT Meets GPT: Targeted Operations with Untamed LLMs
UTA0388
2025-10-08Cyfirmacyfirma
CYBER THREAT LANDSCAPE REPORT – UNITED ARAB EMIRATES (UAE)
Kazu
2025-10-07Rapid7Jakub Zvarik
Crimson Collective: A New Threat Group Observed Operating in the Cloud
2025-10-07Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
Vietnamese Threat Group Uses Vampire Bot to Target Digital Professionals
Vampire Bot
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-06MicrosoftMicrosoft Threat Intelligence
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
Medusa Storm-1175
2025-10-06Recorded FutureDevin Thorne
BIETA: A Technology Enablement Front for China's MSS
2025-10-06BlackPointCaden Toellner, Nevan Beal, Sam Decker
Malicious Node Package Deploys OtterCookie
OtterCookie
2025-10-03TechzineErik van Klinken
What we know so far about Red Hat’s GitLab instance breach
Crimson Collective
2025-10-02Medium BI.ZONEBI.ZONE
Cavalry Werewolf raids Russia’s public sector with trusted relationship attacks
FoalShell StallionRAT YoroTrooper