Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-03-04Github (prodaft)PRODAFT
Ragnar Loader Indicators of Compromise (IOC)
Unidentified 103 (FIN8)
2025-03-03Trend MicroAdam O'Connor, Catherine Loveria, Gabriel Cardoso, Ian Kenefick, Jack Walsh, Jovit Samaniego, Lucas Silva, Stephen Carbery
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal
Black Basta Black Basta Cactus ReedBed
2025-03-01ZW01fMohamed Ezat
An in-depth analysis of APT37’s latest campaign
RokRAT
2025-02-28Palo Alto Networks Unit 42Margaret Kelley
JavaGhost’s Persistent Phishing Attacks From the Cloud
JavaGhost
2025-02-28CrowdStrikeCrowdStrike
2025 Global Threat Report
GOLD REBELLION UNC4393
2025-02-27SC MediaSC Staff
Over 600 organizations subjected to global EncryptHub attacks
Larva-208
2025-02-27AhnLabASEC
Phishing Email Attacks by the Larva-24005 Group Targeting Japan
Larva-24005
2025-02-27Github (knight0x07)neeraj
NailaoLoader: Hiding Execution Flow via Patching
NailaoLocker
2025-02-27Palo Alto Networks Unit 42Lior Rochberger, Tom Fakterman
Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations
FINALDRAFT FINALDRAFT
2025-02-27Check Point ResearchItay Cohen
Modern Approach to Attributing Hacktivist Groups
2025-02-27WAR ON THE ROCKSNathaniel Davis, Nina Kollars
The Rise of the Fake Tech Workforce: State-Sponsored Infiltration of U.S. Technical Supply Chains
2025-02-27FortinetPei Han Liao
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan
ValleyRAT Winos
2025-02-27MicrosoftSteven Masada
Disrupting a global cybercrime network abusing generative AI
Storm-2139
2025-02-27Cyber GeeksCyberMasterV
Russian campaign targeting Romanian WhatsApp numbers
2025-02-26ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
FOG Ransomware Attacks the Energy Sector in Turkey
STOP
2025-02-26POLITICOAntoaneta Roussi
Chinese hackers siphoned off Belgian state security emails, report says
2025-02-26Medium extensiontotalAmit Assaraf
A Wolf in Dark Mode: The Malicious VS Code Theme That Fooled Millions
2025-02-24EUR-LexOfficial Journal of the European Union
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24Intel 471Intel 471
Android trojan TgToxic updates its capabilities
TgToxic