Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-26cyfirma
Raven Stealer Unmasked
Raven Stealer
2025-07-26Reverse The MalwareDiyar Saadi
User History Artifact : Practical Gathering of Artifacts
2025-07-26Reverse The MalwareDiyar Saadi
Forensic Artifacts for User Windows History Activity
2025-07-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
The Operational Blueprint of Kimsuky APT for Cyber Espionage
Kimsuky
2025-07-25CloudsekCloudsek
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware
Epsilon Red
2025-07-24SYGNIASygnia Team
Fire Ant: A Deep-Dive into Hypervisor-Level Espionage
2025-07-24The Washington TimesBill Gertz
Hackers breach intelligence website used by CIA
2025-07-24Bleeping ComputerSergiu Gatlan
BlackSuit ransomware extortion sites seized in Operation Checkmate
BlackSuit Royal Ransom BlackSuit Mount Locker Royal Ransom
2025-07-24Dr.WebDr.Web
Gamers, get ready: scammers disguise cryptocurrency and password-stealing Scavenger trojans as cheats and mods
Scavenger
2025-07-24Red CanaryThe Red Canary Team
Intelligence Insights: July 2025
Broomstick
2025-07-23SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation CargoTalon : UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant.
2025-07-23Cato NetworksVitaly Simonovich
Cato CTRL™ Threat Research: Analyzing LAMEHUG – First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)
LAMEHUG
2025-07-23bluecyberSon Vu
APT32 Malware: An In-Depth Analysis
OceanLotus
2025-07-23CatalystCatalyst
Understanding Current CastleLoader Campaigns
CASTLELOADER
2025-07-23OPFOR JournalOPFOR Journal
Singapore Takes Unprecedented Military Action Against Chinese State-Sponsored Hackers
2025-07-23Stranded on Pylos BlogJoe Slowik
Will the Real Salt Typhoon Please Stand Up?
KV
2025-07-23MandiantMandiant Incident Response
From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
2025-07-22Recorded FutureInsikt Group®
Anatomy of DDoSia: NoName057(16)'s DDoS Infrastructure and Targeting
Dosia
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603