Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-01Medium walmartglobaltechJason Reaves
Janela RAT and a stealer extension delivered together
JanelaRAT
2025-07-01ANSSIANSSI
Houken: Seeking a Path by Living on The Edge With Zero-Days
GOREVERSE
2025-07-01ANSSIANSSI
Houken seeking a path by living on the edge with zero-days
GOREshell
2025-06-30MicrosoftMicrosoft Threat Intelligence
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident
2025-06-29Medium Sapir TwigSapir Twig
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat
DarkGate
2025-06-29Humpty's RE Blogcyb3rjerry
Supper is served
Supper
2025-06-27WithSecureMohammad Kazem Hassan Nejad
WEEVILPROXY
WEEVILPROXY
2025-06-27axiosSam Sabin
Prolific cybercriminal group now targeting aviation, transportation companies
2025-06-27TEHTRISLefebvre Fabien
Rage Against the Powershell - Qilin in the Name
Qilin
2025-06-26Arctic WolfArctic Wolf Labs Team
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
GIFTEDCROOK
2025-06-25Check Point ResearchCheck Point Research
In the Wild: Malware Prototype with Embedded Prompt Injection
Skynet
2025-06-24CertegoFederico Fantini
Malware Analysis - Inside Lumma Stealer
Lumma Stealer
2025-06-24SocketSocket
Another Wave: North Korean Contagious Interview Campaign Drops 35 New Malicious npm Packages
BeaverTail InvisibleFerret
2025-06-24TrellixNico Paulo Yturriaga, Pham Duy Phuc
OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure
2025-06-24BridewellBridewell
2025 Cyber Threat Intelligence Report
AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver
2025-06-23DeXposeM4lcode
AnyDesk Clone Drops .NET Loader with AES Encrypted Payload and AV Evasion Delivering Phemedrone Stealer
Phemedrone Stealer
2025-06-23GdataKarsten Hahn, Lance Go
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware
EvilConwi
2025-06-23PolySwarm Tech TeamThe Hivemind
Famous Chollima’s PylangGhost
GolangGhost PylangGhost GolangGhost
2025-06-23cocomelonccocomelonc
Linux hacking part 6: Linux kernel module with params. Simple C example