Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-21Bleeping ComputerBill Toulas
Russia to enforce location tracking app on all foreigners in Moscow
2025-05-20European CouncilCouncil of the European Union
Russian hybrid threats: EU lists further 21 individuals and 6 entities and introduces sectoral measures in response to destabilising activities against the EU, its member states and international partners
2025-05-20KasperskyAMR
https://securelist.ru/purerat-attacks-russian-organizations/112619/
PureLogs Stealer
2025-05-20AcronisJozsef Gegeny, Prakas Thevendaran, Santiago Pontiroli
From banks to battalions: SideWinder’s attacks on South Asia’s public sector
2025-05-19The DFIR Report0xtornado, pcsc0ut, Randy Pargman
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware
Mimic Ransomware MimiKatz
2025-05-19RalfHacker
GitHub - Adaptix-Framework//AdaptixC2
AdaptixC2
2025-05-17Denwp ResearchTonmoy Jitu
More_Eggs? A Venom Spider Backdoor Targeting HR
More_eggs
2025-05-14LACYoshihiro Ishikawa
Continued EAGERBEE (Thumtais) malware activity
EagerBee
2025-05-13Trend MicroPhilip Chen, Pierre Lee, Vickie Su
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
2025-05-13EclecticIQArda Büyükkaya
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
KrustyLoader SNOWLIGHT Vshell
2025-05-13Cisco TalosAsheer Malhotra, Ashley Shen, Edmund Brumaghin, Vitor Ventura
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-12SynacktivMaxence Fossat
Open-source toolset of an Ivanti CSA attacker
HTran iox reGeorg
2025-05-12ESET ResearchESET Research
ESET APT Activity Report Q4 2024–Q1 2025
BeaverTail InvisibleFerret GolangGhost
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-10cocomelonccocomelonc
Malware development trick 47: simple Windows clipboard hijacking. Simple C example.
CosmicDuke RokRAT
2025-05-09LumenBlack Lotus Labs
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-08DataBreaches.net@chum1ng0, Dissent
Negotiations with the Akira ransomware group: an ill-advised approach
Akira
2025-05-08FortinetRan Mizrahi
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware
Ratty
2025-05-08ForescoutLuca Barba, Sai Molige
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor
Chaya_004
2025-05-07FBIFBI
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities
TheMoon