Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-20KasperskyAMR
https://securelist.ru/purerat-attacks-russian-organizations/112619/
PureRAT
2025-05-20Luigi Martire, Pierluigi Paganini
Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang
Sarcoma
2025-05-20European CouncilCouncil of the European Union
Russian hybrid threats: EU lists further 21 individuals and 6 entities and introduces sectoral measures in response to destabilising activities against the EU, its member states and international partners
2025-05-20AcronisJozsef Gegeny, Prakas Thevendaran, Santiago Pontiroli
From banks to battalions: SideWinder’s attacks on South Asia’s public sector
2025-05-16AhnLabASEC
DBatLoader (ModiLoader) Being Distributed to Turkish Users
DBatLoader
2025-05-16GdataKarsten Hahn
Printer company provided infected software downloads for half a year
SnipVex
2025-05-15EST SecurityAlyac
Beware of Backdoor Malware being Distributed by Exploiting Legitimate Certificates!
NikiHTTP
2025-05-15ESET ResearchMatthieu Faou
Operation RoundPress
SpyPress
2025-05-14ZscalerThreatLabZ research team
Technical Analysis of TransferLoader
TransferLoader
2025-05-13Trend MicroPhilip Chen, Pierre Lee, Vickie Su
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
2025-05-13EclecticIQArda Büyükkaya
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
KrustyLoader SNOWLIGHT VShell
2025-05-13Cisco TalosAsheer Malhotra, Ashley Shen, Edmund Brumaghin, Vitor Ventura
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-13CSAAhmad Abdillah
Intrusion Insights Straight from Leaked Operator Chats
LockBit LockBit LockBit
2025-05-13GdataChloe de Leon, Lovely Antonio
Sit, Fetch, Steal - Chihuahua Stealer: A new Breed of Infostealer
Chihuahua
2025-05-12SynacktivMaxence Fossat
Open-source toolset of an Ivanti CSA attacker
HTran iox reGeorg
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-09LumenChris Formosa, Ryan English
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09US Department of JusticeU.S. Attorney's Office, Northern District of Oklahoma
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
TheMoon
2025-05-09LumenBlack Lotus Labs
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-08DataBreaches.net@chum1ng0, Dissent
Negotiations with the Akira ransomware group: an ill-advised approach
Akira