Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-28GreynoiseGreyNoise Research
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
2025-05-27AIVDAIVD
Unknown Russian group behind hacks Dutch targets
Void Blizzard
2025-05-27Trend MicroJoseph C Chen
Earth Lamia Develops Custom Arsenal to Target Multiple Industries
BypassBoss Cobalt Strike JuicyPotato PULSEPACK STOWAWAY Vshell
2025-05-27DomainToolsDomainTools
Inside a VenomRAT Malware Campaign
Venom RAT
2025-05-27FortinetXiaopeng Zhang
Infostealer Malware FormBook Spread via Phishing Campaign – Part II
Formbook
2025-05-27DCSOBennet Conrads, Denis Szadkowski, Johann Aydinbas, Moaath Oudeh
SafePay: The new kid on the block
SafePay
2025-05-27MicrosoftMicrosoft Threat Intelligence
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Void Blizzard
2025-05-27AIVDAIVD
AIVD and MIVD identify new Russian cyber threat actor
2025-05-26Yonhap News AgencyKim Boram
Investigation into SK Telecom data breach expands to KT, LG Uplus: sources
BPFDoor
2025-05-23Shadow BankerShadow Banker
Shadow Banker Makes Glorious Return, Interviews Guy Exposing Conti Command & Control
Conti Conti
2025-05-23TechCrunchLorenzo Franceschi-Bicchierai
Mysterious hacking group Careto was run by the Spanish government, sources say
Careto Careto
2025-05-23abuse.chabuse.ch
MalwareBazaar - AurotunStealer
Aurotun Stealer
2025-05-22ElasticDaniel Stepanic
De-obfuscating ALCATRAZ
DOUBLELOADER Rhadamanthys
2025-05-22Recorded FutureInsikt Group
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents
CHERRYSPY HATVIBE
2025-05-22Recorded FutureInsikt Group
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Templates
CHERRYSPY HATVIBE
2025-05-22SekoiaFélix Aime, Jeremy Scion
ViciousTrap – Infiltrate, Control, Lure: Turning edge devices into honeypots en masse.
2025-05-22Cisco TalosAsheer Malhotra, Brandon White
UAT-6382 exploits Cityworks zero-day vulnerability to deliver malware
Tetra Loader
2025-05-22ESET ResearchTomáš Procházka
Danabot: Analyzing a fallen empire
DanaBot
2025-05-22FlashpointFlashpoint
Operation Endgame: Global Law Enforcement Takes Down DanaBot Malware Scheme
DanaBot
2025-05-22KrebsOnSecurityBrian Krebs
Oops: DanaBot Malware Devs Infected Their Own PCs
DanaBot