Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-04-24Positive TechnologiesPT Expert Security Center
Crypters And Tools. Part 2: Different Paws — Same Tangle
2025-04-16IBM X-ForceIBM Security X-Force Team
IBM X-Force 2025 Threat Intelligence Index
2025-04-15Beazley Security LabsBeazley Security Labs
Hunting Mice In Tunnels II - Fake CAPTCHAs and Ransomware
Interlock Supper
2025-04-15SecurityWeekThe Associated Press
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games
2025-04-09ResecurityResecurity
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach
Jabaroot
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors
badbazaar
2025-04-09NCSC UKASD, BND, Bundesamt für Verfassungsschutz, Canadian Centre for Cyber Security (CCCS), FBI, NCSC UK, New Zealand National Cyber Security Centre (NZ NCSC), NSA
NCSC and partners share guidance for communities at high risk of digital surveillance
badbazaar
2025-04-07The RecordDaryna Antoniuk
Flaw in ESET security software used to spread malware from ToddyCat group
2025-04-06GridinsoftGridinsoft Cyber Security
How to Remove Lilith RAT: Complete Removal Guide
Lilith puNK-003
2025-03-18WeLiveSecurityDominik Breitenbacher
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor
Anel AsyncRAT
2025-03-11Juniper NetworksCybersecurity R&D
The RedPenguin Malware Incident
tsh
2025-02-28KrebsOnSecurityBrian Krebs
Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab
FAKEUPDATES GootLoader
2025-02-26POLITICOAntoaneta Roussi
Chinese hackers siphoned off Belgian state security emails, report says
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24K7 SecuritySuresh Reddy
LCRYX Ransomware: How a VB Ransomware Locks Your System
LCRYX
2025-02-20Cyber Security NewsBalaji N
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware
RokRAT
2025-02-18K7 SecurityHarihara Sudhan
Exposing the Deceit: Phishing Sites Impersonating Government Entities
2025-02-11Github (SecurityBlueTeam)Security Blue Team
Smartloader Wireshark plugin
SmartLoader
2025-02-11CyberSecurityNewsDo Son
Sandworm APT Exploits Trojanized KMS Tools to Target Ukrainian Users in Cyber Espionage Campaign
DCRat