Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-09-30Github (KittenBusters)0x1c3N, KittenBusters
KittenBusters: CharmingKitten
BellaCiao
2025-09-30K7 SecurityUma Madasamy
PatchWork APT
2025-09-30Palo Alto Networks Unit 42Lior Rochberger
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite
NET-STAR
2025-09-30ElasticElastic
WARMCOOKIE One Year Later: New Features and Fresh Insights
WarmCookie
2025-09-30SynthientSynthient
GhostSocks: From Initial Access to Residential Proxy
GhostSocks Lumma Stealer
2025-09-29The DFIR ReportThe DFIR Report
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion
Brute Ratel C4 Cobalt Strike Latrodectus
2025-09-28Malasada TechAaron Samala
Oyster Malware Delivery via Teams Fake App
Broomstick
2025-09-26Arctic WolfArctic Wolf
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
Akira Akira
2025-09-26BlackPointNevan Beal, Sam Decker
Malicious Teams Installers Drop Oyster Malware
Broomstick
2025-09-25LogpointAkanksha Giri, Anish Bogati
XWorm RAT analysis: Steal,
 persist & control
XWorm
2025-09-25Trend MicroJacob Santos, Sarah Pearl Camiling
New LockBit 5.0 Targets Windows, Linux, ESXi
LockBit LockBit
2025-09-25ESET ResearchMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Virus BulletinMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Koi SecurityIdan Dardikman
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails
2025-09-24GoogleAshley Pearson, Austin Larsen, BRAD SLAYBAUGH, Doug Bienstock, Geoff Carstairs, John Wolfram, Josh Madeley, Josh Murchie, Matt Lin, Sarah Yoder
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
BRICKSTORM
2025-09-24The Hacker NewsRavie Lakshmanan
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
Cobalt Strike Leslieloader Pantegana SparkRAT Storm-2077
2025-09-24NetresecErik Hjelmvik
Gh0stKCP Protocol
PseudoManuscrypt ValleyRAT
2025-09-23MalwarebytesPieter Arntz
Fake Malwarebytes, LastPass, and others on GitHub serve malware
AMOS
2025-09-23Bleeping ComputerBill Toulas
Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack
Aisuru
2025-09-23ZscalerZscaler
YiBackdoor: A New Malware Family With Links to IcedID and Latrodectus
YiBackdoor