Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-13Twitter (@Unit42_Intel)Unit 42
Tweet about APT27 SysUpdate activity
HyperSSL HyperSSL
2025-06-13Recorded FutureInsikt Group
GrayAlpha Uses Diverse Infection Vectors to Deploy PowerNet Loader and NetSupport RAT
EugenLoader POWERTRASH NetSupportManager RAT
2025-06-12Check Point ResearchCheck Point
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
AsyncRAT Skuld
2025-06-12InfobloxInfoblox Threat Intelligence Group
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal
DollyWay
2025-06-12CitizenLabBill Marczak, John Scott-Railton
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted
2025-06-12SymantecCarbon Black, Threat Hunter Team
Fog Ransomware: Unusual Toolset Used in Recent Attack
Fog
2025-06-12cocomelonccocomelonc
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example
2025-06-11InterpolInterpol
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
2025-06-10Check Point ResearchCheck Point Research
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage
Horus
2025-06-10abuse.ch
MalwareBazaar | SHA256 73fd51d4a0959e5c5a82db9be0d765069d02a2b97f51f55f5d6422a7bec01caa (AmateraStealer)
Amatera
2025-06-09Sentinel LABSAleksandar Milenkoski, Tom Hegel
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
GOREshell Nimbo-C2 ShadowPad
2025-06-09NetresecErik Hjelmvik
Detecting PureLogs traffic with CapLoader
PureLogs Stealer
2025-06-09ZscalerThreatLabZ research team, Zscaler
DanaBleed: DanaBot C2 Server Memory Leak Bug
DanaBot
2025-06-09KasperskyKaspersky
Sleep with one eye open: how Librarian Ghouls steal data by night
2025-06-09GeniansGenians
Analysis of the Triple Combo Threat of the Kimsuky Group
FlowerPower Appleseed BabyShark
2025-06-06SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware.
Vshell
2025-06-05ReliaquestRELIAQUEST THREAT RESEARCH TEAM
Scattered Spider Targets Tech Companies for Help-Desk Exploitation
2025-06-05ESET ResearchESET Research
BladedFeline: Whispering in the dark
Hawking RDAT Spereal Veaty
2025-06-05Hunt.ioHunt.io
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
AsyncRAT XWorm
2025-06-05FBIFBI
Alert Number: I-060525-PSA - Home Internet Connected Devices Facilitate Criminal Activity
BADBOX