Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-20Orange CyberdefenseAlexis Bonnefoi, Marine PICHON
A Pain in the Mist: Navigating Operation DreamJob’s arsenal
BURNBOOK MISTPEN
2025-11-20ThreatFabricThreatFabric
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption
Sturnus
2025-11-19NetAskari SubstackNetAskari
Critical strike: China's hacking training grounds (PART 1)
2025-11-19Natto ThoughtsEugenio Benincasa, Natto Team
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs
2025-11-19AmazonCJ Moses
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare
2025-11-19SpamhausJonas Arnold
The anatomy of bulletproof hosting – past, present, future
2025-11-19SecurityScorecardGilad Friedenreich Maizles, Marty Kareem
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-11-18Cert-UACert-UA
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329)
GAMYBEAR
2025-11-17AhnLabASEC Analysis Team
NKNShell Malware Distributed via VPN Website
Larva-24010
2025-11-170x0d4y0x0d4y
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea
ScoringMathTea
2025-11-15ElasticJia Yu Chan, Salim Bitam
RONINGLOADER: DragonBreath’s New Path to PPL Abuse
DragonBreath RONINGLOADER
2025-11-14The RecordJonathan Greig
Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million
2025-11-13Ransom-ISACYashraj Solanki
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3)
JADESNOW
2025-11-13Politie NLPolitie NL
Again criminal infrastructure dismantled in international ransomware operation
Rhadamanthys Venom RAT
2025-11-13NVISO LabsBart Parys, Efstratios Lontzetidis, Stef Collart
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery
BeaverTail OtterCookie InvisibleFerret Beavertail TsunamiKit
2025-11-13AnthropicAnthropic
Disrupting the first reported AI-orchestrated cyber espionage campaign
GTG-1002
2025-11-13Israel National Digital AgencyAdi Pick, Hila David, Idan Beit-Yosef, Shimi Cohen, Yaniv Goldman
SpearSpecter: Unmasking Iran’s IRGC Cyber Operations Targeting High-Profile Individuals
TAMECAT
2025-11-12ISCBrad Duncan
SmartApeSG campaign uses ClickFix page to push NetSupport RAT
SmartApeSG NetSupportManager RAT
2025-11-12AmazonCJ Moses
Amazon discovers APT exploiting Cisco and Citrix zero-days