Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-13cocomelonccocomelonc
Mobile malware development trick 1. Abuse Telegram Bot API. Simple Android (Java/Kotlin) stealer example.
2025-07-12t0ast's blogt0ast
Global Group: Ransomware-as-a-Service with AI-powered Negotiation
Global
2025-07-11Authentic8A8 Team
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw
NightEagle
2025-07-10IBM X-ForceChris Caridi, Golo Mühr
Hive0145 back in German inboxes with Strela Stealer and a backdoor
StarFish
2025-07-08cocomelonccocomelonc
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples
2025-07-08AcronisAcronis Security
SafePay ransomware: the fast rising threat targeting MSPs
SafePay
2025-07-08Koi SecurityIdan Dardikman
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-07-08United States District Court (Southern District of New York)United States District Court Southern District of New York
Badbox Takedown Court Order
BADBOX
2025-07-07MeterpreterDDOS
ANSSI Exposes “Houken”: China-Linked APT Exploiting Ivanti CSA Zero-Days & Deploying Linux Rootkits
Houken
2025-07-07CyberSecurityNewsKaavija
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
NightEagle
2025-07-07Github (VenzoV)VenzoV
Golang garbled executable from Amatera config
Amatera
2025-07-06MalwareTraceJared G.
XWorm Part 2 - From Downloader to Config Extraction
XWorm
2025-07-04ANSSIANSSI
Houken seeking a path by living on the edge with zero-days
Houken
2025-07-04The Hacker NewsRavie Lakshmanan
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
NightEagle
2025-07-04cocomelonccocomelonc
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples
2025-07-04QianxinRedDrip7
Exclusive disclosure of the attack activities of the APT group “NightEagle”
2025-07-03MalwareTraceJared G.
XWorm Part 1 - Unraveling a Steganography-Based Downloader
XWorm
2025-07-03Rapid7Rapid7
Scattered Spider: Rapid7 Insights, Observations, and Recommendations
MimiKatz POORTRY
2025-07-020x0d4y0x0d4y
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting
VELETRIX