Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-11-05nvisoMaxime Thiebaut
Decoding VShell: Insights into a Chinese-Language Cyber Espionage Tool
VShell
2025-11-02SymantecBroadcom, Symantec
Multi-Stage In-Memory Agent Tesla Campaign Targets LATAM
Agent Tesla
2025-10-31ExpelAARON WALTON
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates
Broomstick
2025-10-16TrendmicroJunestherry Dela Cruz
Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing
Lumma Stealer
2025-09-26Arctic WolfArctic Wolf
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less
Akira Akira
2025-09-19BlackPointCaden Toellner, Nevan Beal, Sam Decker
KeyZero: A Custom PowerShell RAT
2025-09-19ESET ResearchMatthieu Faou, Zoltán Rusnák
Gamaredon X Turla collab
PteroGraphin
2025-09-11IBM X-ForceGolo Mühr, Joshua Chung
Hive0154, aka Mustang Panda, drops updated Toneshell backdoor and novel SnakeDisk USB worm
PUBLOAD SnakeDisk TONESHELL Yokai
2025-08-27PlainBitHeejae Hwang
PureHVNC malware disguised as a copyright infringement notice email
ClipBanker PureRAT
2025-08-18TrellixRyan Weil
A Comprehensive Analysis of HijackLoader and Its Infection Chain
HijackLoader
2025-08-12bluecyberKhắc Minh
Analysis of a ClickFix malware attack
Vidar
2025-08-11cocomelonccocomelonc
Malware development trick 49: abusing Azure DevOps REST API for covert data channels. Simple C examples.
AllaKore
2025-07-31Reverse The MalwareDiyar Saadi
Threat Intelligence visa ccTLD ( country code top-level domain )
2025-07-29ForesietForesiet
AURA Stealer: A Crude Clone of LummaC2 – Technical Analysis and Threat Breakdown
Aura Stealer
2025-07-07Github (VenzoV)VenzoV
Golang garbled executable from Amatera config
Amatera
2025-06-24TrellixNico Paulo Yturriaga, Pham Duy Phuc
OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure
2025-06-19Government of CanadaGovernment of Canada
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign
2025-05-29ElasticJia Yu Chan
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns
EDDIESTEALER
2025-05-21TrendmicroJunestherry Dela Cruz
TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead
Stealc Vidar
2025-05-07FBIFBI
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers
TheMoon