Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-07Palo Alto Networks Unit 42Unit 42
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation
APT35
2025-05-06AkamaiKyle Lefton
Here Comes Mirai: IoT Devices RSVP to Active Exploitation
LZRD
2025-05-05BleepingComputerLawrence Abrams
New "Bring Your Own Installer" EDR bypass used in ransomware attack
2025-05-05Hunt.ioHunt.io
APT36-Style ClickFix Attack Spoofs Indian Ministry to Target Windows & Linux
2025-05-05Security ChuSecurity Chu
Negotiations with the Akira ransomware group: an ill-advised approach
Akira Akira
2025-05-01ZscalerThreatLabZ research team
I StealC You: Tracking the Rapid Changes To StealC
Stealc
2025-04-30SeqriteMahua Chakrabarthy, Sanjay Katkar
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government
Crimson RAT
2025-04-30Google Cloud CommunityPraveeth DSouza
Finding Malware: Unveiling LUMMAC.V2 with Google Security Operations
Lumma Stealer
2025-04-29Nextron SystemsMaurice Fielenbach
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements”
Cobalt Strike Nitrogen Loader
2025-04-29France DiplomatieFrance Diplomatie
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025)
2025-04-29TrustwaveTrustwave SpiderLabs
Yet Another NodeJS Backdoor (YaNB): A Modern Challenge
KongTuke
2025-04-29LinkedIn (Ethical Hackers Academy)Ethical Hackers Academy
RansomHub Ransomware Deploys Malware to Breach Corporate Networks
FAKEUPDATES RansomHub
2025-04-28CensysThe Censys Research Team
Scouting a Threat Actor
2025-04-28InfobloxDarby Wise, Laura da Rocha, Piotr Glaska
Uncovering Actor TTP Patterns and the Role of DNS in Investment Scams
Reckless Rabbit Ruthless Rabbit
2025-04-25CensysCensys
The Persistent Threat of Salt Typhoon: Tracking Exposures of Potentially Targeted Devices
MASOL
2025-04-240xreverseUtku Çorbacı
Understanding Alcatraz ~ Obfuscator Analysis [EN]
2025-04-23Cisco TalosAsheer Malhotra, Ashley Shen, Brandon White, Joey Chen, Vitor Ventura
Introducing ToyMaker, an initial access broker working in cahoots with double extortion gangs
HOLERUN
2025-04-23Trend MicroFeike Hacquebord, Stephen Hilt
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations
BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost WageMole
2025-04-22Kaspersky LabsAlexander Demidov, Georgy Kucherin, Igor Kuznetsov
Russian organizations targeted by backdoor masquerading as secure networking software updates
2025-04-22VolexityCharlie Gardner, Josh Duke, Matthew Meltzer, Sean Koessel, Steven Adair, Tom Lancaster
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows
UTA0352 UTA0355