Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-09-07Hexastrike CybersecurityMaurice Fielenbach
ValleyRAT Exploiting BYOVD to Kill Endpoint Security
ValleyRAT
2025-09-04SentinelOneAleksandar Milenkoski, Kenneth Kinion, Sreekar Madabushi
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms
ContagiousDrop
2025-08-21Swiss Post CybersecurityLouis Schürmann
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer
donut_injector
2025-08-12bluecyberKhắc Minh
Analysis of a ClickFix malware attack
Vidar
2025-08-10DEFCON 33Seongsu Park
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors
2025-07-30RUSILouise Marie Hurel
What Singapore's First Public Cyber Attribution Tells Us
2025-07-28Kyiv IndependentMartin Fornusek
Hacker group claims responsibility for cyberattack on Russia's Aeroflot
2025-07-27Cyber Intelligence InsightsVasilis Orlof
Bulletproof Hosting Hunt: Connecting the dots from Lumma to Qwins Ltd (ASN 213702)
Lumma Stealer
2025-07-27Medium RaghavtiResearchBeGoodToAll
Lumma Stealer — A Proliferating Threat in the Cybercrime Landscape
Lumma Stealer
2025-07-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
The Operational Blueprint of Kimsuky APT for Cyber Espionage
Kimsuky
2025-07-23bluecyberSon Vu
APT32 Malware: An In-Depth Analysis
OceanLotus
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
2025-07-22Cryptika cybersecurityCryptika cybersecurity
DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools
DeerStealer
2025-07-19The RegisterJessica Lyons
Ex-IDF cyber chief on Iran, Scattered Spider, and why social engineering worries him more than 0-days
2025-07-18WiredKim Zetter
How China’s Patriotic ‘Honkers’ Became the Nation’s Elite Cyberspies
2025-07-18Kyiv IndependentAndrea Januta, Anna Fratsyvir
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says
2025-07-18The RecordAlexander Martin
UK sanctions Russian cyber spies accused of facilitating murders
WhisperGate
2025-07-17NJCCICNew Jersey Cybersecurity & Communications Integration Cell
ClickFix Leading to MonsterV2 Infostealer
MonsterV2
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-11Authentic8A8 Team
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw
NightEagle