Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-07-08Koi SecurityIdan Dardikman
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-07-08United States District Court (Southern District of New York)United States District Court Southern District of New York
Badbox Takedown Court Order
BADBOX
2025-07-07Github (VenzoV)VenzoV
Golang garbled executable from Amatera config
Amatera
2025-07-04QianxinRedDrip7
Exclusive disclosure of the attack activities of the APT group “NightEagle”
2025-07-03Rapid7Rapid7
Scattered Spider: Rapid7 Insights, Observations, and Recommendations
MimiKatz POORTRY
2025-07-02CrowdStrikeCounter Adversary Operations
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
2025-07-02NetresecErik Hjelmvik
PureLogs Forensics
PureLogs Stealer
2025-07-02K7 SecuritySuresh Reddy
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?
AMOS
2025-07-01SpyCloudSpyCloud Labs Research Team
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry
2025-07-01Medium walmartglobaltechJason Reaves
Janela RAT and a stealer extension delivered together
JanelaRAT
2025-07-01ANSSIANSSI
Houken: Seeking a Path by Living on The Edge With Zero-Days
GOREVERSE
2025-07-01ANSSIANSSI
Houken seeking a path by living on the edge with zero-days
GOREshell
2025-06-30MicrosoftMicrosoft Threat Intelligence
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident
2025-06-29Medium Sapir TwigSapir Twig
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat
DarkGate
2025-06-29Humpty's RE Blogcyb3rjerry
Supper is served
Supper
2025-06-27axiosSam Sabin
Prolific cybercriminal group now targeting aviation, transportation companies
2025-06-27TEHTRISLefebvre Fabien
Rage Against the Powershell - Qilin in the Name
Qilin
2025-06-26Arctic WolfArctic Wolf Labs Team
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations
GIFTEDCROOK