Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-24CyproChristian Yng
CastleLoader Malware Infects 469 Devices Using Fake GitHub Repos and ClickFix Phishing
CASTLELOADER
2025-07-24SYGNIASygnia Team
Fire Ant: A Deep-Dive into Hypervisor-Level Espionage
2025-07-24The Washington TimesBill Gertz
Hackers breach intelligence website used by CIA
2025-07-24Bleeping ComputerSergiu Gatlan
BlackSuit ransomware extortion sites seized in Operation Checkmate
BlackSuit Royal Ransom BlackSuit Mount Locker Royal Ransom
2025-07-24Dr.WebDr.Web
Gamers, get ready: scammers disguise cryptocurrency and password-stealing Scavenger trojans as cheats and mods
Scavenger
2025-07-24Red CanaryThe Red Canary Team
Intelligence Insights: July 2025
Broomstick
2025-07-23Rewterz Information SecurityRewterz Information Security
APT UNG0002 Expands Cyber Espionage Campaigns Across Asia – Active IOCs
UNG0002
2025-07-23SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation CargoTalon : UNG0901 Targets Russian Aerospace & Defense Sector using EAGLET implant.
UNG0901
2025-07-23Cato NetworksVitaly Simonovich
Cato CTRL™ Threat Research: Analyzing LAMEHUG – First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)
LAMEHUG
2025-07-23bluecyberSon Vu
APT32 Malware: An In-Depth Analysis
OceanLotus
2025-07-23CatalystCatalyst
Understanding Current CastleLoader Campaigns
CASTLELOADER
2025-07-23OPFOR JournalOPFOR Journal
Singapore Takes Unprecedented Military Action Against Chinese State-Sponsored Hackers
2025-07-23Stranded on Pylos BlogJoe Slowik
Will the Real Salt Typhoon Please Stand Up?
KV
2025-07-23MandiantMandiant Incident Response
From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem
2025-07-22Cryptika cybersecurityCryptika cybersecurity
DeerStealer Malware Delivered Via Weaponized .LNK Using LOLBin Tools
DeerStealer
2025-07-22Recorded FutureInsikt Group®
Anatomy of DDoSia: NoName057(16)'s DDoS Infrastructure and Targeting
Dosia
2025-07-22MicrosoftMicrosoft Threat Intelligence
Disrupting active exploitation of on-premises SharePoint vulnerabilities
Storm-2603
2025-07-22AkamaiTomer Peled
Coyote in the Wild: First-Ever Malware That Abuses UI Automation
2025-07-21BarracudaTony Burgess
Malware Brief: A malware foursome working together
MeltingClaw ROMCOM RAT TransferLoader