Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-04Twitter (@nextronresearch)Nextron Threat Research Team
Tweet about BQT ransomware on Linux
BQTlock
2025-11-03Breached CompanyBreached Company
When the Defenders Become the Attackers: Cybersecurity Experts Indicted for BlackCat Ransomware Operations
BlackCat BlackCat
2025-11-03SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation Peek-a-Baku: Silent Lynx APT makes sluggish shift to Dushanbe
Laplas (Reverseshell) SilentSweeper YoroTrooper
2025-11-02SymantecBroadcom, Symantec
Multi-Stage In-Memory Agent Tesla Campaign Targets LATAM
Agent Tesla
2025-10-31SeqriteSathwik Ram Prakki
Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus
2025-10-31ExpelAARON WALTON
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates
Broomstick
2025-10-30Github (cocomelonc)cocomelonc
Malware development trick 54: steal data via legit Angelcam API. Simple C example
2025-10-30Arctic WolfArctic Wolf Labs Team
UNC6384 Weaponizes ZDI-CAN-25373 Vulnerability to Deploy PlugX Against Hungarian and Belgian Diplomatic Entities
PlugX
2025-10-30Gen DigitalAlexandru-Cristian Bardaș
DPRK’s Playbook: Kimsuky’s HttpTroy and Lazarus’s New BLINDINGCAN Variant
ComeBacker DRATzarus NikiTeaR
2025-10-30Twitter (@DarkWebInformer)Dark Web Informer
Tweet about Aisuru C2 being on top of Cloudflare Radar / Top100 domain
Aisuru
2025-10-29Palo Alto Networks Unit 42Chema Garcia, Kristopher Russo
Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack
Airstalk CL-STA-1009
2025-10-29QianxinAcey9, Alex.Turing
Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed
PolarEdge
2025-10-28KrebsOnSecurityBrian Krebs
Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru
2025-10-28ThreatFabricThreatFabric
New Android Malware Herodotus Mimics Human Behaviour to Evade Detection
2025-10-28KasperskyOmar Amin, Sojun Ryu
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
2025-10-27Trend MicroEmmanuel Panopio, Jeffrey Francis Bonaobra, Joe Soares
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C
Water Saci
2025-10-27Ransom-ISACEllis Stannard
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 2)
JADESNOW
2025-10-27BartBlaze
Earth Estries alive and kicking
2025-10-27KasperskyBoris Larin
Mem3nt0 mori – The Hacking Team is back!
Dante
2025-10-25MandarNaik016Mandar Naik
Malware Analysis - VIP Keylogger - Part 2
VIP Keylogger