Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-18Kyiv IndependentAndrea Januta, Anna Fratsyvir
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says
2025-07-18The RecordAlexander Martin
UK sanctions Russian cyber spies accused of facilitating murders
WhisperGate
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-16Reverse The MalwareDiyar Saadi
Analysis Fake reCAPTCHA ( Powershell Stage )
2025-07-16ProofpointMark Kelly, Proofpoint Threat Research Team
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
Cobalt Strike Voldemort
2025-07-15Reverse The MalwareDiyar Saadi
Analysis Malicious LNK Part 2
2025-07-14Reverse The MalwareDiyar Saadi
Analysis Malicious LNK File
2025-07-14SocketKirill Boychenko
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
BeaverTail InvisibleFerret
2025-07-14Arda BüyükkayaEclecticIQ Threat Research Team
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
Global
2025-07-10IBM X-ForceChris Caridi, Golo Mühr
Hive0145 back in German inboxes with Strela Stealer and a backdoor
StarFish
2025-07-08Koi SecurityIdan Dardikman
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-07-08United States District Court (Southern District of New York)United States District Court Southern District of New York
Badbox Takedown Court Order
BADBOX
2025-07-04QianxinRedDrip7
Exclusive disclosure of the attack activities of the APT group “NightEagle”
2025-07-02CrowdStrikeCounter Adversary Operations
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
2025-07-02NetresecErik Hjelmvik
PureLogs Forensics
PureLogs Stealer
2025-07-02K7 SecuritySuresh Reddy
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?
AMOS
2025-07-01SpyCloudSpyCloud Labs Research Team
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry
2025-07-01ANSSIANSSI
Houken: Seeking a Path by Living on The Edge With Zero-Days
GOREVERSE
2025-07-01ANSSIANSSI
Houken seeking a path by living on the edge with zero-days
GOREshell