Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-04Beazley Security LabsAlex Delamotte, Bobby Venal, Francisco Donoso, Jim Walter, Sam Mayers, Tell Hause
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
PXA Stealer
2025-07-30GBHackers on SecurityLucas Mancilha
Lazarus Group enhances malware delivery by using new techniques
OtterCookie
2025-07-19Eye SecurityEye Security
SharePoint 0-day uncovered (CVE-2025-53770)
SharPyShell
2025-07-17NJCCICNew Jersey Cybersecurity & Communications Integration Cell
ClickFix Leading to MonsterV2 Infostealer
MonsterV2
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-08AcronisAcronis Security
SafePay ransomware: the fast rising threat targeting MSPs
SafePay
2025-07-08Koi SecurityIdan Dardikman
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.
2025-07-07CyberSecurityNewsKaavija
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
NightEagle
2025-07-02K7 SecuritySuresh Reddy
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?
AMOS
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident
2025-06-20K7 SecurityBaran S
SpyMax
SpyMax
2025-06-16SecurityScorecardSTRIKE Team
Checking all the Boxes: LapDogs, The New ORB in Town
ShortLeash ShortLeash
2025-06-14K7 SecurityUma Madasamy
SpectraRansomware
Chaos
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-05-22KrebsOnSecurityBrian Krebs
Oops: DanaBot Malware Devs Infected Their Own PCs
DanaBot
2025-05-20KrebsOnSecurityBrian Krebs
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
AIRASHI Aisuru
2025-05-15EST SecurityAlyac
Beware of Backdoor Malware being Distributed by Exploiting Legitimate Certificates!
NikiHTTP
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-07NTT SecurityMasaya Motoda, Rintaro Koike
Additional Features of OtterCookie Malware Used by WaterPlum
BeaverTail OtterCookie InvisibleFerret
2025-05-06NCSC SwitzerlandNCSC Switzerland
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II