Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-07Rapid7Jakub Zvarik
Crimson Collective: A New Threat Group Observed Operating in the Cloud
2025-10-07Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
Vietnamese Threat Group Uses Vampire Bot to Target Digital Professionals
Vampire Bot
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-06MicrosoftMicrosoft Threat Intelligence
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability
MedusaLocker
2025-10-03TechzineErik van Klinken
What we know so far about Red Hat’s GitLab instance breach
Crimson Collective
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-10-01heavyscientist
Aisuru DDoS Campaign: Threat Intelligence Assessment
Aisuru
2025-10-01Checkpointhasherezade
Rhadamanthys 0.9.x – walk through the updates
Rhadamanthys
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russian Cyber Operations
WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer
2025-09-30InfobloxInfoblox Threat Intelligence Group
Detour Dog: DNS Malware Powers Strela Stealer Campaigns
StrelaStealer
2025-09-30K7 SecurityUma Madasamy
PatchWork APT
2025-09-30ElasticElastic
WARMCOOKIE One Year Later: New Features and Fresh Insights
WarmCookie
2025-09-29ShindanPaul Viard
DHCSpy - Discovering the Iranian APT MuddyWater
DHCSpy
2025-09-25LogpointAkanksha Giri, Anish Bogati
XWorm RAT analysis: Steal,
 persist & control
XWorm
2025-09-25ESET ResearchMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Virus BulletinMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Koi SecurityIdan Dardikman
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails
2025-09-24Natto ThoughtsNatto Team
Who is Salt Typhoon Really? Unraveling the Attribution Challenge