Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-15Medium b.magnezi0xMrMagnezi
Ave Maria Malware Analysis
Ave Maria
2025-05-14LACYoshihiro Ishikawa
Continued EAGERBEE (Thumtais) malware activity
EagerBee
2025-05-14ZscalerThreatLabZ research team
Technical Analysis of TransferLoader
TransferLoader
2025-05-13Trend MicroPhilip Chen, Pierre Lee, Vickie Su
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
2025-05-13ProofpointGreg Lesnewich, Mark Kelly, Saher Naumaan
TA406 Pivots to the Front
2025-05-13EclecticIQArda Büyükkaya
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
KrustyLoader SNOWLIGHT Vshell
2025-05-13Cisco TalosAsheer Malhotra, Ashley Shen, Edmund Brumaghin, Vitor Ventura
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-13CSAAhmad Abdillah
Intrusion Insights Straight from Leaked Operator Chats
LockBit LockBit LockBit
2025-05-13GdataChloe de Leon, Lovely Antonio
Sit, Fetch, Steal - Chihuahua Stealer: A new Breed of Infostealer
Chihuahua
2025-05-12SeqriteSubhajeet Singha
Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants
Pterois Swan Vector
2025-05-12ESET ResearchESET Research
ESET APT Activity Report Q4 2024–Q1 2025
BeaverTail InvisibleFerret GolangGhost
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-09LumenChris Formosa, Ryan English
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09US Department of JusticeU.S. Attorney's Office, Northern District of Oklahoma
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
TheMoon
2025-05-09LumenBlack Lotus Labs
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09Sophos X-OpsAndrew Petrus, Ben Goldberg, Haigh Minassian, Imane Ismail, Sushmita Shetty
Lumma Stealer, coming and going
Lumma Stealer
2025-05-08DataBreaches.net@chum1ng0, Dissent
Negotiations with the Akira ransomware group: an ill-advised approach
Akira
2025-05-08WithSecureWithSecure
KeePass trojanised in advanced malware campaign
Nitrogen Loader
2025-05-08FortinetRan Mizrahi
Multilayered Email Attack: How a PDF Invoice and Geo-Fencing Led to RAT Malware
Ratty
2025-05-08ForescoutLuca Barba, Sai Molige
Threat Analysis: SAP Vulnerability Exploited in the Wild by Chinese Threat Actor
Chaya_004