Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Environmental Protection AgencyEPA Press Office
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Reverse The MalwareDiyar Saadi
From Pixels to Payloads: Understanding Malicious PNG Files
2025-12-09Reverse The MalwareDiyar Saadi
Debunking a Malware Technique That Bypasses Binwalk Using dd
2025-12-09BlackPointSam Decker
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
CASTLELOADER
2025-12-09Huntress LabsJonathan Semon, Stuart Ashenbrenner
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok
AMOS
2025-12-08sysdigSysdig Threat Research Team
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
EtherRAT
2025-12-08KrollAlessio Ragazzi, Dave Waugh, Mikesh Nagar
New AMOS Infection Vector Highlights Risks around AI Adoption
AMOS
2025-12-08Trend MicroAliakbar Zahravi
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows
GhostPenguin
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey
2025-12-07Reverse The MalwareDiyar Saadi
From Pixels to Payloads: Understanding Malicious BMP Files
2025-12-04AmazonCJ Moses
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
2025-12-04Aryaka Networksbikash dash, varadharajan krishnasamy
Scam in the Cloud How Fraudsters Exploit Google Cloud Storage (GCS) for Deceptive Campaigns
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-12-02Positive TechnologiesIgor Shiryaev, Kirill Navoshchik, Maxim Shamanov, Stanislav Pyzhov, Vladislav Lunin
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025
PUMAKIT
2025-12-02ZscalerAtinderpal Singh
Shai-Hulud V2 Poses Risk To NPM Supply Chain
Shai-Hulud
2025-12-02SynthientSynthient
IPCola: A Tangled Mess
Gaganode Gaganode Gaganode