Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-18GOV.UKForeign Commonwealth & Development Office
UK sanctions Russian spies at the heart of Putin’s malicious regime
2025-07-18Kyiv IndependentAndrea Januta, Anna Fratsyvir
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says
2025-07-18The RecordAlexander Martin
UK sanctions Russian cyber spies accused of facilitating murders
WhisperGate
2025-07-17NJCCICNew Jersey Cybersecurity & Communications Integration Cell
ClickFix Leading to MonsterV2 Infostealer
MonsterV2
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-17National Police Agency (Japan)National Police Agency (Japan)
Phobos/8Base Decryption Tool
8Base Phobos
2025-07-16SeqriteSathwik Ram Prakki, Subhajeet Singha
UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
Shadow RAT
2025-07-16PRODAFTPRODAFT
LARVA-208’s New Campaign Targets Web3 Developers
SilentPrism Fickle Stealer
2025-07-16cocomelonccocomelonc
Malware and cryptography 43 - encrypt/decrypt payload via Mars cipher. Simple C example.
2025-07-16Reverse The MalwareDiyar Saadi
Analysis Fake reCAPTCHA ( Powershell Stage )
2025-07-16Reverse The MalwareDiyar Saadi
Analysis Malicious reCAPTCHA
2025-07-16Reverse The MalwareDiyar Saadi
Analysis CryptoMiner Sample ( Script Based )
2025-07-16ShindanPaul Viard
Crocodilus - A deep dive into its structure and capabilities
Crocodilus
2025-07-16ProofpointMark Kelly, Proofpoint Threat Research Team
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
Cobalt Strike Voldemort UNK_DropPitch UNK_FistBump UNK_SparkyCarp
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious HTA Dropper .
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Second Stage of Double Encoded Malicious Powershell
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Double Encoded Malicious Powershell
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious Powershell ( Part 4 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 3 )
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious JAR ( Part 2 )