Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-31Reverse The MalwareDiyar Saadi
Directory Monitor : DFIR Directory Monitoring Toolki
2025-07-31Reverse The MalwareDiyar Saadi
Moo0 File Monitor : DFIR File Monitoring Toolkit
2025-07-31Reverse The MalwareDiyar Saadi
Free Folder Monitor : DFIR Folders Monitoring Toolkit
2025-07-30cocomelonccocomelonc
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example.
2025-07-30GBHackers on SecurityLucas Mancilha
Lazarus Group enhances malware delivery by using new techniques
OtterCookie
2025-07-29ForesietForesiet
AURA Stealer: A Crude Clone of LummaC2 – Technical Analysis and Threat Breakdown
Aura Stealer
2025-07-28BitSightPedro Falé
ToxicPanda: The Android Banking Trojan Targeting Europe
TgToxic ToxicPanda
2025-07-28Invoke REJosh Reynolds
Scavenger Malware Distributed via num2words PyPI Supply Chain Compromise
Scavenger
2025-07-28Kyiv IndependentMartin Fornusek
Hacker group claims responsibility for cyberattack on Russia's Aeroflot
2025-07-27Bleeping ComputerBill Toulas
Scattered Spider is running a VMware ESXi hacking spree
2025-07-26cyfirma
Raven Stealer Unmasked
Raven Stealer
2025-07-25Aryaka NetworksAditya K. Sood, varadharajan krishnasamy
The Operational Blueprint of Kimsuky APT for Cyber Espionage
Kimsuky
2025-07-25CloudsekCloudsek
Threat Actors Lure Victims Into Downloading .HTA Files Using ClickFix To Spread Epsilon Red Ransomware
Epsilon Red
2025-07-24The Washington TimesBill Gertz
Hackers breach intelligence website used by CIA
2025-07-24Bleeping ComputerSergiu Gatlan
BlackSuit ransomware extortion sites seized in Operation Checkmate
BlackSuit Royal Ransom BlackSuit Mount Locker Royal Ransom
2025-07-23Cato NetworksVitaly Simonovich
Cato CTRL™ Threat Research: Analyzing LAMEHUG – First Known LLM-Powered Malware with Links to APT28 (Fancy Bear)
LAMEHUG
2025-07-23OPFOR JournalOPFOR Journal
Singapore Takes Unprecedented Military Action Against Chinese State-Sponsored Hackers
2025-07-23Stranded on Pylos BlogJoe Slowik
Will the Real Salt Typhoon Please Stand Up?
KV
2025-07-23MandiantMandiant Incident Response
From Help Desk to Hypervisor: Defending Your VMware vSphere Estate from UNC3944
2025-07-23Natto ThoughtsNatto Team
HAFNIUM-Linked Hacker Xu Zewei: Riding the Tides of China’s Cyber Ecosystem