Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-19Red CanaryChris Brook, Christina Johns, Tyler Edmonds
Patching for persistence: How DripDropper Linux malware moves through the cloud
2025-08-18TrellixAlex Lanstein, Pham Duy Phuc
The Coordinated Embassy Hunt: Unmasking the DPRK-linked GitHub C2 Espionage Campaign
XenoRAT
2025-08-18Medium RaghavtiResearchBeGoodToAll
Qilin Ransomware-as-a-Service: Threat Analysis and Strategic Outlook
Qilin AgendaCrypt
2025-08-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7237 targets Taiwanese web hosting infrastructure
SoundBill
2025-08-15Bleeping ComputerBill Toulas
Colt Telecom attack claimed by WarLock ransomware, data up for sale
WarLock
2025-08-14CensysHimaja Motheram
2025 State of the Internet: Digging into Residential Proxy Infrastructure
PolarEdge
2025-08-13GdataKarsten Hahn
JustAskJacky: AI causes a Trojan Horse Comeback
TamperedChef
2025-08-12The New York TimesAdam Goldman, Glenn Thrush, Mattathias Schwartz
Russia Is Suspected to Be Behind Breach of Federal Court Filing System
2025-08-12bluecyberKhắc Minh
Analysis of a ClickFix malware attack
Vidar
2025-08-12NetresecErik Hjelmvik
PureRAT = ResolverRAT = PureHVNC
PureRAT
2025-08-08K7 SecurityAzhagan K M S
Silent Watcher: Dissecting Cmimai Stealer’s VBS Payload
Cmimai Stealer
2025-08-08AhnLabAhnLab ASEC Analysis Team
Distribution of SmartLoader Malware via Github Repository Disguised as a Legitimate Project
Rhadamanthys SmartLoader
2025-08-08Reverse The MalwareDiyar Saadi
Detecting and Identifying Hidden Processes (Volatility Edition)
2025-08-06KasperskyDmitry Kalinin
Spyware that pretends to be an antivirus
LunaSpy
2025-08-06ANY.RUNMauro Eldritch
PyLangGhost RAT: Rising Stealer from Lazarus Group Striking Finance and Technology
PylangGhost GolangGhost
2025-08-06Silent PushSilent Push
Unmasking SocGholish: Silent Push Untangles the Malware Web Behind the “Pioneer of Fake Updates” and Its Operator, TA569
FAKEUPDATES MintsLoader Parrot TDS Parrot TDS WebShell Raspberry Robin
2025-08-05DefentiveDefentive Threat Research
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT
Ghost RAT
2025-08-03Reverse The MalwareDiyar Saadi
Identifying a Domain Generation Algorithm
2025-08-03Reverse The MalwareDiyar Saadi
Gathering Indicators of Compromise Through Malware Datasets.
2025-08-01Infrawatch Research Team
Belarus-Linked DSLRoot Proxy Network Deploys Hardware in U.S. Residences, Including Military Homes