Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-23GdataKarsten Hahn, Lance Go
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
EvilConwi
2025-06-23PolySwarm Tech TeamThe Hivemind
Famous Chollima’s PylangGhost
GolangGhost PylangGhost GolangGhost
2025-06-23cocomelonccocomelonc
Linux hacking part 6: Linux kernel module with params. Simple C example
2025-06-23RushterArtem Golubin
Threat Hunting Introduction: Cobalt Strike
Cobalt Strike
2025-06-23DarkatlasDarkatlas Squad
Bluenoroff (APT38) Live Infrastructure Hunting
2025-06-21Cert-UACert-UA
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT
BEARDSHELL GRUNT SLIMAGENT
2025-06-20K7 SecurityBaran S
SpyMax
SpyMax
2025-06-20Field EffectDaniel Albrecht, Elena Lapina, Field Effect, Sean Alexander
Zoom & doom: BlueNoroff call opens the door
2025-06-20ValidinKenneth Kinion
Zooming through BlueNoroff Indicators with Validin
2025-06-20Twitter (@threatintel)Threat Intelligence
Tweet about wiper deployed against Albania by Druidfly
2025-06-20Github (VenzoV)VenzoV
Analysis of Amatera Stealer v1 (Test build)
Amatera
2025-06-19Recorded FutureInsikt Group
DRAT V2: Updated DRAT Emerges in TAG-140’s Arsenal
DRAT TAG-140
2025-06-19Hunt.ioHunt.io
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure
Cobalt Strike
2025-06-19Government of CanadaGovernment of Canada
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign
2025-06-19cocomelonccocomelonc
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example
2025-06-18Red CanaryRed Canary
Mocha Manakin delivers custom NodeJS backdoor via paste and run
Mocha Manakin
2025-06-18GoogleGabby Roncone, Wesley Shields
What’s in an ASP? Creative Phishing Attack on Prominent Academics and Critics of Russia
UNC6293
2025-06-18SecuronixTim Peck
Analyzing SERPENTINE#CLOUD: Threat Actors Abuse Cloudflare Tunnels to Infect Systems with Stealthy Python-Based Malware
2025-06-18SeqritePrashil Moon
Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry
MASS Logger
2025-06-18Cisco TalosVanja Svajcer
Famous Chollima deploying Python version of GolangGhost RAT
GolangGhost PylangGhost GolangGhost