Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-11Trend MicroDaniel Lunghi, Feike Hacquebord, Ian Kenefick
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics
ROMCOM RAT SHADOW-VOID-042
2025-12-11MalwarebytesPieter Arntz
Another Chrome zero-day under attack: update now
2025-12-10SpyCloudSpyCloud Labs Research Team
Analyzing the Impact of the Operation Endgame Takedown on Rhadamanthys & the MaaS Ecosystem
Rhadamanthys
2025-12-10The RecordJonathan Greig
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure
2025-12-10Check Point ResearchCheck Point Research, Jiří Vinopal
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits
ValleyRAT
2025-12-10Trend MicroAshish Verma, Deep Patel, Jack Walsh, Lucas Silva, Peter Girnus
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation
2025-12-10zimperiumVishnu Pratapagiri
Total Takeover: DroidLock Hijacks Your Device
DroidLock
2025-12-10NetresecErik Hjelmvik
Latrodectus BackConnect
IcedID Keyhole Latrodectus
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Environmental Protection AgencyEPA Press Office
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09BlackPointSam Decker
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery
CASTLELOADER
2025-12-08Ransom-ISACAndrii Sovershennyi, Nick Smart
Cross-Chain TxDataHiding Crypto Heist: A Very (Very) Chainful Process (Part 4)
JADESNOW
2025-12-08sysdigSysdig Threat Research Team
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
EtherRAT
2025-12-04ControlwareSerkan Sirmaci
Beyond Potentially Unwanted Apps
TamperedChef
2025-12-04AmazonCJ Moses
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-12-03Hunt.ioHunt.io
Malicious VSCode Extension Launches Multi-Stage Attack Chain with Anivia Loader and OctoRAT
OctoRAT
2025-12-02Trend MicroByron Gelera, Emmanuel Panopio, Ian Kenefick, Jeffrey Francis Bonaobra, Joe Soares, Sarah Pearl Camiling
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp
Water Saci