Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-13CSAAhmad Abdillah
Intrusion Insights Straight from Leaked Operator Chats
LockBit LockBit LockBit
2025-05-13GdataChloe de Leon, Lovely Antonio
Sit, Fetch, Steal - Chihuahua Stealer: A new Breed of Infostealer
Chihuahua
2025-05-12SeqriteSubhajeet Singha
Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants
Pterois Swan Vector
2025-05-12ESET ResearchESET Research
ESET APT Activity Report Q4 2024–Q1 2025
BeaverTail InvisibleFerret GolangGhost
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-09LumenChris Formosa, Ryan English
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09US Department of JusticeU.S. Attorney's Office, Northern District of Oklahoma
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
TheMoon
2025-05-09LumenBlack Lotus Labs
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09Sophos X-OpsAndrew Petrus, Ben Goldberg, Haigh Minassian, Imane Ismail, Sushmita Shetty
Lumma Stealer, coming and going
Lumma Stealer
2025-05-08DataBreaches.net@chum1ng0, Dissent
Negotiations with the Akira ransomware group: an ill-advised approach
Akira
2025-05-08WithSecureWithSecure
KeePass trojanised in advanced malware campaign
Nitrogen Loader
2025-05-08FortinetRan Mizrahi
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware
Ratty
2025-05-08ForescoutLuca Barba, Sai Molige
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor
Chaya_004
2025-05-07GoogleWesley Shields
COLDRIVER Using New Malware To Steal Documents From Western Targets and NGOs
LOSTKEYS
2025-05-07EuropolEuropol
DDoS-for-hire empire brought down: Poland arrests 4 administrators, US seizes 9 domains
2025-05-07US Department of JusticeU.S. Attorney's Officea Northern District of Oklahoma
Case 4:25-cr-00160-JDR: Indictment of Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, Aleksandr Aleksandrovich Shishkin and Dmitriy Rubtsov
TheMoon
2025-05-07FBIFBI
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities
TheMoon
2025-05-07FBIFBI
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers
TheMoon
2025-05-07Palo Alto Networks Unit 42Unit 42
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation
APT35
2025-05-07NTT SecurityMasaya Motoda, Rintaro Koike
Additional Features of OtterCookie Malware Used by WaterPlum
BeaverTail OtterCookie InvisibleFerret