Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-03Breached CompanyBreached Company
When the Defenders Become the Attackers: Cybersecurity Experts Indicted for BlackCat Ransomware Operations
BlackCat BlackCat
2025-11-03SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation Peek-a-Baku: Silent Lynx APT makes sluggish shift to Dushanbe
Laplas (Reverseshell) SilentSweeper
2025-11-02SymantecBroadcom, Symantec
Multi-Stage In-Memory Agent Tesla Campaign Targets LATAM
Agent Tesla
2025-10-31SeqriteSathwik Ram Prakki
Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus
2025-10-31ExpelAARON WALTON
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates
Broomstick
2025-10-30Gen DigitalAlexandru-Cristian Bardaș
DPRK’s Playbook: Kimsuky’s HttpTroy and Lazarus’s New BLINDINGCAN Variant
ComeBacker DRATzarus NikiTeaR
2025-10-30Twitter (@DarkWebInformer)Dark Web Informer
Tweet about Aisuru C2 being on top of Cloudflare Radar / Top100 domain
Aisuru
2025-10-29QianxinAcey9, Alex.Turing
Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed
PolarEdge
2025-10-28KrebsOnSecurityBrian Krebs
Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru
2025-10-28ThreatFabricThreatFabric
New Android Malware Herodotus Mimics Human Behaviour to Evade Detection
2025-10-28KasperskyOmar Amin, Sojun Ryu
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
2025-10-27BartBlaze
Earth Estries alive and kicking
2025-10-27KasperskyBoris Larin
Mem3nt0 mori – The Hacking Team is back!
Dante
2025-10-25MandarNaik016Mandar Naik
Malware Analysis - VIP Keylogger - Part 2
VIP Keylogger
2025-10-23ESET ResearchAlexis Rapin, Peter Kálnai
Gotta fly: Lazarus targets the UAV sector
BURNBOOK QuanPinLoader ScoringMathTea
2025-10-23Twitter (@salmanvsf)Salman Shaikh
Tweet about Discovery of Smile PaaS admin panel
2025-10-22Multilateral Sanctions Monitoring TeamMultilateral Sanctions Monitoring Team
The DPRK's Violation and Evasion of UN Sanctions through Cyber and Information Technology Worker Activities
2025-10-22Trend MicroDaniel Lunghi, Joseph C Chen, Lenart Bermejo, Leon M Chang, Vickie Su
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns
Cobalt Strike DracuLoader ShadowPad
2025-10-22SentinelOneTom Hegel
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
Princess
2025-10-22CyderesRahul Ramesh
Chrome Installer Impersonation Campaign Targets China-Based Victims with ValleyRAT Trojan
BlindEDR ValleyRAT