Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Environmental Protection AgencyEPA Press Office
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Reverse The MalwareDiyar Saadi
Debunking a Malware Technique That Bypasses Binwalk Using dd
2025-12-09Huntress LabsJonathan Semon, Stuart Ashenbrenner
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok
AMOS
2025-12-08Ransom-ISACAndrii Sovershennyi, Nick Smart
Cross-Chain TxDataHiding Crypto Heist: A Very (Very) Chainful Process (Part 4)
JADESNOW
2025-12-08sysdigSysdig Threat Research Team
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks
EtherRAT
2025-12-08Trend MicroAliakbar Zahravi
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows
GhostPenguin
2025-12-08Swisscom B2B CSIRTMatthieu Gras, Swisscom B2B CSIRT
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5
Amadey
2025-12-04AmazonCJ Moses
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182)
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM WARP PANDA
2025-12-03Hunt.ioHunt.io
Malicious VSCode Extension Launches Multi-Stage Attack Chain with Anivia Loader and OctoRAT
OctoRAT
2025-12-02Trend MicroByron Gelera, Emmanuel Panopio, Ian Kenefick, Jeffrey Francis Bonaobra, Joe Soares, Sarah Pearl Camiling
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp
Water Saci
2025-12-02Positive TechnologiesIgor Shiryaev, Kirill Navoshchik, Maxim Shamanov, Stanislav Pyzhov, Vladislav Lunin
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025
PUMAKIT
2025-12-02ZscalerAtinderpal Singh
Shai-Hulud V2 Poses Risk To NPM Supply Chain
Shai-Hulud
2025-12-01LinkedIn (Microsoft)Microsoft Threat Intelligence
Post about Phishing Campaign pushing XWorm
XWorm TA584
2025-11-26CERT-FRCERT-FR
Mobile phones: Threat landscape since 2015
2025-11-25DeXposeM4lcode
Inside Valkyrie Stealer: Capabilities, Evasion Techniques, and Operator Profile
Valkyrie Stealer
2025-11-24ISH TecnologiaCaique Barqueta, Ícaro César
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer.