Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-27WAR ON THE ROCKSNathaniel Davis, Nina Kollars
The Rise of the Fake Tech Workforce: State-Sponsored Infiltration of U.S. Technical Supply Chains
2025-02-27FortinetPei Han Liao
Winos 4.0 Spreads via Impersonation of Official Email to Target Users in Taiwan
ValleyRAT Winos
2025-02-27MicrosoftSteven Masada
Disrupting a global cybercrime network abusing generative AI
Storm-2139
2025-02-27Cyber GeeksCyberMasterV
Russian campaign targeting Romanian WhatsApp numbers
2025-02-27Medium b.magnezi0xMrMagnezi
NanoCore Malware Analysis
Nanocore RAT
2025-02-27Securite360.netMuffin
How Long Can a Vulnerable Server Stay Clean on the Internet? A Honeypot Tale
RedTail
2025-02-26ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
FOG Ransomware Attacks the Energy Sector in Turkey
STOP
2025-02-26FBIIC3
Alert Number: I-022625-PSA - North Korea Responsible for $1.5 Billion Bybit Hack
2025-02-26POLITICOAntoaneta Roussi
Chinese hackers siphoned off Belgian state security emails, report says
2025-02-26Medium extensiontotalAmit Assaraf
A Wolf in Dark Mode: The Malicious VS Code Theme That Fooled Millions
2025-02-25Félix Aime, Jeremy Scion, Sekoia TDR
PolarEdge: Unveiling an uncovered ORB network
PolarEdge
2025-02-25Sentinel LABSTom Hegel
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition
2025-02-24Palo Alto Networks Unit 42Alex Armstrong
Auto-Color: An Emerging and Evasive Linux Backdoor
2025-02-24EUR-LexOfficial Journal of the European Union
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine
2025-02-24SecurityScorecardSecurityScorecard STRIKE Team
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks
2025-02-24Intel 471Intel 471
Android trojan TgToxic updates its capabilities
TgToxic
2025-02-24cocomelonccocomelonc
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example.
OceanLotus DuQu StegoLoader
2025-02-24K7 SecuritySuresh Reddy
LCRYX Ransomware: How a VB Ransomware Locks Your System
LCRYX
2025-02-24Kaspersky LabsGeorgy Kucherin, João Godinho
The GitVenom campaign: cryptocurrency theft using GitHub
AsyncRAT Quasar RAT
2025-02-24Medium SlowMistSlowMist
Cryptocurrency APT Intelligence: Unveiling Lazarus Group’s Intrusion Techniques