Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-09-30SynthientSynthient
GhostSocks: From Initial Access to Residential Proxy
GhostSocks Lumma Stealer
2025-09-29The DFIR ReportThe DFIR Report
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion
Brute Ratel C4 Cobalt Strike Latrodectus
2025-09-29ShindanPaul Viard
DHCSpy - Discovering the Iranian APT MuddyWater
DHCSpy
2025-09-28Malasada TechAaron Samala
Oyster Malware Delivery via Teams Fake App
Broomstick
2025-09-26abuse.chabuse.ch
Twitter Post
Kamasers
2025-09-26Arctic WolfArctic Wolf
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
Akira Akira
2025-09-26BlackPointNevan Beal, Sam Decker
Malicious Teams Installers Drop Oyster Malware
Broomstick
2025-09-25LogpointAkanksha Giri, Anish Bogati
XWorm RAT analysis: Steal,
 persist & control
XWorm
2025-09-25Trend MicroJacob Santos, Sarah Pearl Camiling
New LockBit 5.0 Targets Windows, Linux, ESXi
LockBit LockBit
2025-09-25ESET ResearchMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Virus BulletinMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Koi SecurityIdan Dardikman
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails
2025-09-24Natto ThoughtsNatto Team
Who is Salt Typhoon Really? Unraveling the Attribution Challenge
2025-09-24ZscalerSudeep Singh, Yin Hong Chang
COLDRIVER Updates Arsenal with BAITSWITCH and SIMPLEFIX
NOROBOT
2025-09-24GoogleAshley Pearson, Austin Larsen, BRAD SLAYBAUGH, Doug Bienstock, Geoff Carstairs, John Wolfram, Josh Madeley, Josh Murchie, Matt Lin, Sarah Yoder
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
BRICKSTORM
2025-09-24The Hacker NewsRavie Lakshmanan
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
Cobalt Strike Leslieloader Pantegana SparkRAT Storm-2077
2025-09-24NetresecErik Hjelmvik
Gh0stKCP Protocol
PseudoManuscrypt ValleyRAT
2025-09-23MalwarebytesPieter Arntz
Fake Malwarebytes, LastPass, and others on GitHub serve malware
AMOS
2025-09-23Bleeping ComputerBill Toulas
Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack
Aisuru
2025-09-23ZscalerZscaler
YiBackdoor: A New Malware Family With Links to IcedID and Latrodectus
YiBackdoor