Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-21AhnLabASEC
RokRAT Malware Using Malicious Hangul (.HWP) Documents
RokRAT
2025-07-21SentinelOneJim Walter, Simon Kenin, Tom Hegel
SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers
2025-07-21Kaspersky LabsDaniil Pogorelov, Denis Kulik
The SOC files: Rumble in the jungle or APT41’s new target in Africa
Cobalt Strike MimiKatz
2025-07-20rmceoin.github.ioRandy McEoin
Perl based macOS/linux Stealer
Pearl Stealer
2025-07-20UtkonosUtkonos
Supply Chain Trojan sc_trojan_jwjf
Scavenger
2025-07-20Invoke REcyb3rjerry, Josh Reynolds
Scavenger Malware Distributed via eslint-config-prettier NPM Package Supply Chain Compromise
Scavenger
2025-07-20Invoke REcyb3rjerry, Josh Reynolds
Install Linters, Get Malware - DevSecOps Speedrun Edition
Scavenger
2025-07-19The RegisterJessica Lyons
Ex-IDF cyber chief on Iran, Scattered Spider, and why social engineering worries him more than 0-days
2025-07-19Eye SecurityEye Security
SharePoint 0-day uncovered (CVE-2025-53770)
SharPyShell
2025-07-18cocomelonccocomelonc
MacOS hacking part 6: Assebmly intro on ARM(M1). Simple NASM (M1) examples
2025-07-18Arctic WolfArctic Wolf Labs Team
Greedy Sponge Targets Mexico with AllaKore RAT and SystemBC
AllaKore SystemBC
2025-07-18WiredKim Zetter
How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
2025-07-18GOV.UKForeign Commonwealth & Development Office
UK sanctions Russian spies at the heart of Putin’s malicious regime
2025-07-18Kyiv IndependentAndrea Januta, Anna Fratsyvir
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says
2025-07-18The RecordAlexander Martin
UK sanctions Russian cyber spies accused of facilitating murders
WhisperGate
2025-07-17NJCCICNew Jersey Cybersecurity & Communications Integration Cell
ClickFix Leading to MonsterV2 Infostealer
MonsterV2
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-17National Police Agency (Japan)National Police Agency (Japan)
Phobos/8Base Decryption Tool
8Base Phobos
2025-07-16SeqriteSathwik Ram Prakki, Subhajeet Singha
UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
Shadow RAT
2025-07-16PRODAFTPRODAFT
LARVA-208’s New Campaign Targets Web3 Developers
SilentPrism Fickle Stealer