Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-09Huntress LabsJonathan Semon, Stuart Ashenbrenner
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok
AMOS
2025-12-08sysdigSysdig Threat Research Team
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
EtherRAT
2025-12-08KrollAlessio Ragazzi, Dave Waugh, Mikesh Nagar
New AMOS Infection Vector Highlights Risks around AI Adoption
AMOS
2025-12-08Trend MicroAliakbar Zahravi
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows
GhostPenguin
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey
2025-12-07Reverse The MalwareDiyar Saadi
From Pixels to Payloads: Understanding Malicious BMP Files
2025-12-04ControlwareSerkan Sirmaci
Beyond Potentially Unwanted Apps
TamperedChef
2025-12-04AmazonCJ Moses
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
2025-12-04Aryaka Networksbikash dash, varadharajan krishnasamy
Scam in the Cloud How Fraudsters Exploit Google Cloud Storage (GCS) for Deceptive Campaigns
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-12-02Positive TechnologiesIgor Shiryaev, Kirill Navoshchik, Maxim Shamanov, Stanislav Pyzhov, Vladislav Lunin
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025
PUMAKIT
2025-12-02ZscalerAtinderpal Singh
Shai-Hulud V2 Poses Risk To NPM Supply Chain
Shai-Hulud
2025-12-02SynthientSynthient
IPCola: A Tangled Mess
Gaganode Gaganode Gaganode
2025-12-01NetAskari SubstackNetAskari
Critical strike: China's hacking training grounds (PART 2)
2025-12-01Koi SecurityTuval Admoni
4.3 Million Browsers Infected: Inside ShadyPanda's 7-Year Malware Campaign
2025-11-30Twitter (@ClearskySec)ClearSky
Tweet about GamaWiper
GamaWiper
2025-11-28OpenSourceMalwareOpenSourceMalware
"Contagious Interview" campaign abuses Microsoft VSCode tasks to drop malware and gain persistence
BeaverTail InvisibleFerret
2025-11-27Positive TechnologiesAlexander Badayev, Klimentiy Galkin, Vladislav Lunin
Dragons in Thunder
KrustyLoader Sliver
2025-11-26FortiGuard LabsVincent Li
ShadowV2 Casts a Shadow Over IoT Devices
ShadowV2