Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-20Invoke REcyb3rjerry, Josh Reynolds
Scavenger Malware Distributed via eslint-config-prettier NPM Package Supply Chain Compromise
Scavenger
2025-07-18cocomelonccocomelonc
MacOS hacking part 6: Assebmly intro on ARM(M1). Simple NASM (M1) examples
2025-07-18Kyiv IndependentAndrea Januta, Anna Fratsyvir
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says
2025-07-18The RecordAlexander Martin
UK sanctions Russian cyber spies accused of facilitating murders
WhisperGate
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-16SeqriteSathwik Ram Prakki, Subhajeet Singha
UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions
Shadow RAT
2025-07-16ProofpointMark Kelly, Proofpoint Threat Research Team
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting
Cobalt Strike Voldemort UNK_DropPitch UNK_FistBump UNK_SparkyCarp
2025-07-14SocketKirill Boychenko
Contagious Interview Campaign Escalates With 67 Malicious npm Packages and New Malware Loader
BeaverTail InvisibleFerret
2025-07-10IBM X-ForceChris Caridi, Golo Mühr
Hive0145 back in German inboxes with Strela Stealer and a backdoor
StarFish
2025-07-08cocomelonccocomelonc
MacOS hacking part 5: shellcode running. Simple NASM and C (Intel) examples
2025-07-08AcronisAcronis Security
SafePay ransomware: the fast rising threat targeting MSPs
SafePay
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-07-07CyberSecurityNewsKaavija
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware
NightEagle
2025-07-06MalwareTraceJared G.
XWorm Part 2 - From Downloader to Config Extraction
XWorm
2025-07-04The Hacker NewsRavie Lakshmanan
NightEagle APT Exploits Microsoft Exchange Flaw to Target China's Military and Tech Sectors
NightEagle
2025-07-04cocomelonccocomelonc
MacOS hacking part 4: rev shells via x86_64 assembly. Simple NASM and C (Intel, ARM) examples
2025-07-04QianxinRedDrip7
Exclusive disclosure of the attack activities of the APT group “NightEagle”
2025-07-03MalwareTraceJared G.
XWorm Part 1 - Unraveling a Steganography-Based Downloader
XWorm
2025-07-02CrowdStrikeCounter Adversary Operations
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
2025-07-02K7 SecuritySuresh Reddy
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?
AMOS