Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-05-17Denwp ResearchTonmoy Jitu
More_Eggs? A Venom Spider Backdoor Targeting HR
More_eggs
2025-05-16AhnLabASEC
DBatLoader (ModiLoader) Being Distributed to Turkish Users
DBatLoader
2025-05-16Fred Gutierrez, Shunichi Imano
Ransomware Roundup – VanHelsing
VanHelsing
2025-05-16GdataKarsten Hahn
Printer company provided infected software downloads for half a year
SnipVex
2025-05-15ESET ResearchMatthieu Faou
Operation RoundPress
SpyPress
2025-05-15Medium b.magnezi0xMrMagnezi
Ave Maria Malware Analysis
Ave Maria
2025-05-14LACYoshihiro Ishikawa
Continued EAGERBEE (Thumtais) malware activity
EagerBee
2025-05-14ZscalerThreatLabZ research team
Technical Analysis of TransferLoader
TransferLoader
2025-05-13Trend MicroPhilip Chen, Pierre Lee, Vickie Su
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan
2025-05-13ProofpointGreg Lesnewich, Mark Kelly, Saher Naumaan
TA406 Pivots to the Front
2025-05-13EclecticIQArda Büyükkaya
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures
KrustyLoader SNOWLIGHT Vshell
2025-05-13Cisco TalosAsheer Malhotra, Ashley Shen, Edmund Brumaghin, Vitor Ventura
Defining a new methodology for modeling and tracking compartmentalized threats
2025-05-13CSAAhmad Abdillah
Intrusion Insights Straight from Leaked Operator Chats
LockBit LockBit LockBit
2025-05-13GdataChloe de Leon, Lovely Antonio
Sit, Fetch, Steal - Chihuahua Stealer: A new Breed of Infostealer
Chihuahua
2025-05-12SeqriteSubhajeet Singha
Unveiling Swan Vector APT Targeting Taiwan and Japan with varied DLL Implants
Pterois Swan Vector
2025-05-12ESET ResearchESET Research
ESET APT Activity Report Q4 2024–Q1 2025
BeaverTail InvisibleFerret GolangGhost
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-10cocomelonccocomelonc
Malware development trick 47: simple Windows clipboard hijacking. Simple C example.
CosmicDuke RokRAT
2025-05-09LumenChris Formosa, Ryan English
Classic Rock: Hunting a Botnet that preys on the Old
2025-05-09US Department of JusticeU.S. Attorney's Office, Northern District of Oklahoma
Botnet Dismantled in International Operation, Russian and Kazakhstani Administrators Indicted
TheMoon