Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-02-28CrowdStrikeCrowdStrike
2025 Global Threat Report
GOLD REBELLION UNC4393
2025-02-27BushidoTokenwilliam thomas
BlackBasta Leaks: Lessons from the Ascension Health attack
Black Basta
2025-02-27Hunt.ioHunt.io
Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure
Joker
2025-02-27SC MediaSC Staff
Over 600 organizations subjected to global EncryptHub attacks
Larva-208
2025-02-27AhnLabASEC
Phishing Email Attacks by the Larva-24005 Group Targeting Japan
Larva-24005
2025-02-27Github (knight0x07)neeraj
NailaoLoader: Hiding Execution Flow via Patching
NailaoLocker
2025-02-27Palo Alto Networks Unit 42Lior Rochberger, Tom Fakterman
Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations
FINALDRAFT FINALDRAFT
2025-02-27Check Point ResearchItay Cohen
Modern Approach to Attributing Hacktivist Groups
2025-02-27WAR ON THE ROCKSNathaniel Davis, Nina Kollars
The Rise of the Fake Tech Workforce: State-Sponsored Infiltration of U.S. Technical Supply Chains
2025-02-27MicrosoftSteven Masada
Disrupting a global cybercrime network abusing generative AI
Storm-2139
2025-02-27Cyber GeeksCyberMasterV
Russian campaign targeting Romanian WhatsApp numbers
2025-02-26OntinueBalazs Greksza, Domenico de Vitto, Manupriya Sharma, Rhys Downing
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations
Black Basta Black Basta
2025-02-26ThreatMonAziz Kaplan, ThreatMon, ThreatMon Malware Research Team
FOG Ransomware Attacks the Energy Sector in Turkey
STOP
2025-02-26FBIIC3
Alert Number: I-022625-PSA - North Korea Responsible for $1.5 Billion Bybit Hack
2025-02-26POLITICOAntoaneta Roussi
Chinese hackers siphoned off Belgian state security emails, report says
2025-02-26Medium extensiontotalAmit Assaraf
A Wolf in Dark Mode: The Malicious VS Code Theme That Fooled Millions
2025-02-25Félix Aime, Jeremy Scion, Sekoia TDR
PolarEdge: Unveiling an uncovered ORB network
PolarEdge
2025-02-25Sentinel LABSTom Hegel
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition
2025-02-24Palo Alto Networks Unit 42Alex Armstrong
Auto-Color: An Emerging and Evasive Linux Backdoor
2025-02-24EUR-LexOfficial Journal of the European Union
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine