Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-12Check Point ResearchCheck Point
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery
AsyncRAT Skuld
2025-06-12InfobloxInfoblox Threat Intelligence Group
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal
DollyWay
2025-06-12SymantecCarbon Black, Threat Hunter Team
Fog Ransomware: Unusual Toolset Used in Recent Attack
Fog
2025-06-12cocomelonccocomelonc
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example
2025-06-11InterpolInterpol
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown
2025-06-09Sentinel LABSAleksandar Milenkoski, Tom Hegel
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets
GOREshell Nimbo-C2 ShadowPad
2025-06-05Hunt.ioHunt.io
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure
AsyncRAT XWorm
2025-06-05FBIFBI
Alert Number: I-060525-PSA - Home Internet Connected Devices Facilitate Criminal Activity
BADBOX
2025-06-05Cisco TalosAsheer Malhotra, Dmytro Korzhevin, Jacob Finn
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
PathWiper
2025-06-05Mobile-Hackermh
Analysis of Spyware That Helped to Compromise a Syrian Army from Within
SpyMax
2025-06-03cocomelonccocomelonc
Linux hacking part 5: building a Linux keylogger. Simple C example
2025-06-02Aryaka Networksbikash dash, varadharajan krishnasamy
Remcos on the Wire: Analyzing Network Artifacts and C2 Command Structures
Remcos
2025-05-31The InsiderChristo Grozev, Michael Weiss, Roman Dobrokhotov
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad
2025-05-30CensysHimaja Motheram
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign
2025-05-28DarktraceTara Gould
PumaBot: Novel Botnet Targeting IoT Surveillance Devices
PumaBot
2025-05-28GooglePatrick Whitsell
Mark Your Calendar: APT41 Innovative Tactics
TOUGHPROGRESS
2025-05-28GreynoiseGreyNoise Research
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers
2025-05-27AIVDAIVD
Unknown Russian group behind hacks Dutch targets
Void Blizzard
2025-05-27MicrosoftMicrosoft Threat Intelligence
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage
Void Blizzard
2025-05-27AIVDAIVD
AIVD and MIVD identify new Russian cyber threat actor