Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-05KrebsOnSecurityBrian Krebs
Cloudflare Scrubs Aisuru Botnet from Top Domains List
Aisuru
2025-11-05nvisoMaxime Thiebaut
Decoding VShell: Insights into a Chinese-Language Cyber Espionage Tool
VShell
2025-11-04BitdefenderAdrian Schipor, Martin Zugec, Victor Vrabie
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines
Curly COMrades
2025-11-04The RecordJonathan Greig
Treasury sanctions 8 for laundering North Korea earnings from cybercrime, IT worker scheme
2025-11-04Twitter (@nextronresearch)Nextron Threat Research Team
Tweet about BQT ransomware on Linux
BQTlock
2025-11-03Breached CompanyBreached Company
When the Defenders Become the Attackers: Cybersecurity Experts Indicted for BlackCat Ransomware Operations
BlackCat BlackCat
2025-11-03SeqriteSathwik Ram Prakki, Subhajeet Singha
Operation Peek-a-Baku: Silent Lynx APT makes sluggish shift to Dushanbe
Laplas (Reverseshell) SilentSweeper YoroTrooper
2025-11-02SymantecBroadcom, Symantec
Multi-Stage In-Memory Agent Tesla Campaign Targets LATAM
Agent Tesla
2025-10-31SeqriteSathwik Ram Prakki
Operation SkyCloak: Tor Campaign targets Military of Russia & Belarus
2025-10-31ExpelAARON WALTON
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates
Broomstick
2025-10-30Gen DigitalAlexandru-Cristian Bardaș
DPRK’s Playbook: Kimsuky’s HttpTroy and Lazarus’s New BLINDINGCAN Variant
ComeBacker DRATzarus NikiTeaR
2025-10-30Twitter (@DarkWebInformer)Dark Web Informer
Tweet about Aisuru C2 being on top of Cloudflare Radar / Top100 domain
Aisuru
2025-10-29QianxinAcey9, Alex.Turing
Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed
PolarEdge
2025-10-28KrebsOnSecurityBrian Krebs
Aisuru Botnet Shifts from DDoS to Residential Proxies
Aisuru
2025-10-28ThreatFabricThreatFabric
New Android Malware Herodotus Mimics Human Behaviour to Evade Detection
2025-10-28KasperskyOmar Amin, Sojun Ryu
Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs
2025-10-27Trend MicroEmmanuel Panopio, Jeffrey Francis Bonaobra, Joe Soares
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C
Water Saci
2025-10-27Ransom-ISACEllis Stannard
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 2)
JADESNOW
2025-10-27BartBlaze
Earth Estries alive and kicking
2025-10-27KasperskyBoris Larin
Mem3nt0 mori – The Hacking Team is back!
Dante