Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-09DARKReadingNate Nelson
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
2026-01-08CloudseksomedieyoungZZ
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant
Archer RAT
2026-01-08Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7290 targets high value telecommunications infrastructure in South Asia
DriveSwitch RushDrop SilentRaid DAGGER PANDA
2026-01-07MalBeaconMalBeacon
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations
NightshadeC2
2026-01-07Huntress LabsAnna Pham, Matt Anderson
The Great VM Escape: ESXi Exploitation in the Wild
2026-01-06TrellixAswath A
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics
CrazyHunter
2026-01-06TechCrunchZack Whittaker
Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software
pcTattletale
2026-01-05HudsonRockInfoStealers
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
2026-01-03Linkedin (Tammy H.)Tammy H.
Emerging Threat: The DeadFrog AV/EDR Killer
2025-12-30BotcrawlSean Doyle
Saudi Icon Data Breach Exposes 4.15TB in Alleged Kazu Ransomware Attack
Kazu
2025-12-30Koi SecurityGal Hachamov, Tuval Admoni
DarkSpectre: Unmasking the Threat Actor Behind 8.8 Million Infected Browsers
DarkSpectre ShadyPanda
2025-12-30US Department of JusticeOffice of Public Affairs
Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware
BlackCat BlackCat
2025-12-29LinkedIn (Idan Tarab)Idan Tarab
Active Spear-Phishing Campaign Targeting Israeli Security-Related Individuals — Infrastructure Linked to APT42 (Hashtag#CharmingKitten)
2025-12-23secpodSantosh Sethuraman
Zero-Day Crisis: CVE-2025-20393 Unpatched on Cisco Email Gateways, Exploited by China-Linked Hackers
UAT-9686
2025-12-22Medium Ireneusz TarnowskiIreneusz Tarnowski
Operational Analysis of Communication Channels in Mobile RCS
SpyFRPTunnel
2025-12-21GeniansGenians
Operation Artemis: Analysis of HWP-Based DLL Side Loading Attacks
RokRAT
2025-12-19IntezerNicole Fishbein
Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs
EchoGather
2025-12-18Huntress LabsAustin Worline, Lindsey O'Donnell-Welch
A Series of Unfortunate (RMM) Events
2025-12-18AcronisAcronis Security
Acronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaigns
BADCALL POOLRAT Quasar RAT
2025-12-18Gen Digital IncVojtěch Krejsa
Gen Blogs | Defeating AuraStealer: Practical Deobfuscation Workflows for Modern Infostealers
Aura Stealer