Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-09The Hacker NewsRavie Lakshmanan
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
2026-01-08FBIIC3
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
2026-01-07MalBeaconMalBeacon
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations
NightshadeC2
2026-01-06Reversing LabsRobert Simmons
Unpacking the packer ‘pkr_mtsi’
Broomstick Supper
2026-01-06TrellixAswath A
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics
CrazyHunter
2026-01-06TechCrunchZack Whittaker
Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software
pcTattletale
2026-01-05Github (cocomelonc)cocomelonc
MacOS malware persistence 1: LaunchAgents. Simple C example
2026-01-05HudsonRockInfoStealers
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
2026-01-02The RecordJonathan Greig
Sedgwick confirms cyber incident affecting its major federal contractor subsidiary
TridentLocker
2025-12-30BotcrawlSean Doyle
Saudi Icon Data Breach Exposes 4.15TB in Alleged Kazu Ransomware Attack
Kazu
2025-12-30Koi SecurityGal Hachamov, Tuval Admoni
DarkSpectre: Unmasking the Threat Actor Behind 8.8 Million Infected Browsers
DarkSpectre ShadyPanda
2025-12-30US Department of JusticeOffice of Public Affairs
Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware
BlackCat BlackCat
2025-12-29KasperskyNoushin Shabab
The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor
PlugX TONESHELL
2025-12-29LinkedIn (Idan Tarab)Idan Tarab
Active Spear-Phishing Campaign Targeting Israeli Security-Related Individuals — Infrastructure Linked to APT42 (Hashtag#CharmingKitten)
2025-12-23secpodSantosh Sethuraman
Zero-Day Crisis: CVE-2025-20393 Unpatched on Cisco Email Gateways, Exploited by China-Linked Hackers
UAT-9686
2025-12-21GeniansGenians
Operation Artemis: Analysis of HWP-Based DLL Side Loading Attacks
RokRAT
2025-12-19IntezerNicole Fishbein
Tracing a Paper Werewolf campaign through AI-generated decoys and Excel XLLs
EchoGather
2025-12-18ProofpointProofpoint Threat Research Team
Access granted: phishing with device code authorization for account takeover
TA2723 UNK_AcademicFlare
2025-12-18HelpNetSecurityJohn Wilson
Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
Scripted Sparrow
2025-12-18AcronisAcronis Security
Acronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaigns
BADCALL POOLRAT Quasar RAT