Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-01Checkpointhasherezade
Rhadamanthys 0.9.x – walk through the updates
Rhadamanthys
2025-09-30BloombergEmily Forgash
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russian Cyber Operations
WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer
2025-09-30InfobloxInfoblox Threat Intelligence Group
Detour Dog: DNS Malware Powers Strela Stealer Campaigns
StrelaStealer
2025-09-30Github (KittenBusters)0x1c3N, KittenBusters
KittenBusters: CharmingKitten
BellaCiao
2025-09-30K7 SecurityUma Madasamy
PatchWork APT
2025-09-30Palo Alto Networks Unit 42Lior Rochberger
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite
NET-STAR
2025-09-30ElasticElastic
WARMCOOKIE One Year Later: New Features and Fresh Insights
WarmCookie
2025-09-30SynthientSynthient
GhostSocks: From Initial Access to Residential Proxy
GhostSocks Lumma Stealer
2025-09-29The DFIR ReportThe DFIR Report
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion
Brute Ratel C4 Cobalt Strike Latrodectus
2025-09-29ShindanPaul Viard
DHCSpy - Discovering the Iranian APT MuddyWater
DHCSpy
2025-09-28Malasada TechAaron Samala
Oyster Malware Delivery via Teams Fake App
Broomstick
2025-09-26abuse.chabuse.ch
Twitter Post
Kamasers
2025-09-26Arctic WolfArctic Wolf
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
Akira Akira
2025-09-26BlackPointNevan Beal, Sam Decker
Malicious Teams Installers Drop Oyster Malware
Broomstick
2025-09-25LogpointAkanksha Giri, Anish Bogati
XWorm RAT analysis: Steal,
 persist & control
XWorm
2025-09-25Trend MicroJacob Santos, Sarah Pearl Camiling
New LockBit 5.0 Targets Windows, Linux, ESXi
LockBit LockBit
2025-09-25ESET ResearchMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Virus BulletinMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit