Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-20Ransom-ISACEllis Stannard
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1)
JADESNOW
2025-10-19CNCERTCNCERT
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks
DanderSpritz
2025-10-18Twitter (@ThreatrayLabs)Threatray Labs
Tweet on Kimsuky activity with loaders delivering HttpSpy and HttpTroy
NikiTeaR
2025-10-18Koi SecurityIdan Dardikman
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace
GlassWorm
2025-10-16TrendmicroJunestherry Dela Cruz
Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing
Lumma Stealer
2025-10-16Hunt.ioHunt.io
Odyssey Stealer and AMOS Campaign Targets macOS Developers Through Fake Tools
AMOS
2025-10-16Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution
ACR Stealer
2025-10-16MandiantBlas Kojusner, Joseph Dobson, Robert Wallace
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains
JADESNOW
2025-10-15SymantecThreat Hunter Team
Jewelbug: Chinese APT Group Widens Reach to Russia
2025-10-15David DoddaDvaid Dodda
How I Almost Got Hacked By A 'Job Interview'
OtterCookie
2025-10-15Trend MicroDove Chiu, Lucien Chuang
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits
2025-10-14SynacktivTheo Letailleur
LinkPro: eBPF rootkit analysis
LinkPro
2025-10-14SynacktivTheo Letailleur
LinkPro: analysis of an eBPF rootkit
LinkPro vGet
2025-10-14GatewatcherGatewatcher, Gatewatcher's purple team
Data Breach: the operations of "Charming Kitten" revealed
2025-10-13LogpressoHwang Min-kyung
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS
2025-10-13ProofpointKyle Cucci, Proofpoint Threat Research Team, Selena Larson, Tommy Madjar
When the monster bytes: tracking TA585 and its arsenal
MonsterV2
2025-10-10SocketKirill Boychenko
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
BeaverTail InvisibleFerret
2025-10-09Red CanaryChris Brook, Tony Lambert
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon
AMOS Odyssey Stealer Poseidon Stealer
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-06MicrosoftMicrosoft Threat Intelligence
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
MedusaLocker