Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-19SpamhausJonas Arnold
The anatomy of bulletproof hosting – past, present, future
2025-11-19SecurityScorecardGilad Friedenreich Maizles, Marty Kareem
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-11-18OligoAvi Lumelsky, Gal Elbaz
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet
IronErn440
2025-11-18DataBreaches.netDissent
From bad to worse: Doctor Alliance hacked again by same threat actor (2)
Kazu
2025-11-18Cert-UACert-UA
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329)
GAMYBEAR UAC-0241
2025-11-17KELAKELA Cyber Intelligence Center
ByteToBreach: A Deep Dive into a Persistent Data Leak Operator
ByteToBreach
2025-11-17moldovaliveMarina Gridina
War in the shadows of servers: how a Russian company could have organized an attack against Stark Industries from Moldova
2025-11-17The HIPAA JournalSteve Alder
Doctor Alliance Investigating 353 GB Data Theft Claim
Kazu
2025-11-17AhnLabASEC Analysis Team
NKNShell Malware Distributed via VPN Website
Larva-24010
2025-11-170x0d4y0x0d4y
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea
ScoringMathTea
2025-11-15ElasticJia Yu Chan, Salim Bitam
RONINGLOADER: DragonBreath’s New Path to PPL Abuse
DragonBreath RONINGLOADER
2025-11-14Github (cocomelonc)cocomelonc
Linux hacking part 8: Linux password-protected bind shell. Simple NASM example
2025-11-14The RecordJonathan Greig
Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million
2025-11-13Trend MicroJunestherry Dela Cruz, Sarah Pearl Camiling
Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics
Lumma Stealer Water Kurita
2025-11-13Ransom-ISACYashraj Solanki
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3)
JADESNOW
2025-11-13Politie NLPolitie NL
Again criminal infrastructure dismantled in international ransomware operation
Rhadamanthys Venom RAT
2025-11-13NVISO LabsBart Parys, Efstratios Lontzetidis, Stef Collart
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery
BeaverTail OtterCookie InvisibleFerret Beavertail TsunamiKit
2025-11-13AnthropicAnthropic
Disrupting the first reported AI-orchestrated cyber espionage campaign
GTG-1002