Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-10-14GatewatcherGatewatcher, Gatewatcher's purple team
Data Breach: the operations of "Charming Kitten" revealed
2025-10-13ProofpointKyle Cucci, Proofpoint Threat Research Team, Selena Larson, Tommy Madjar
When the monster bytes: tracking TA585 and its arsenal
MonsterV2
2025-10-10SocketKirill Boychenko
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads
BeaverTail InvisibleFerret
2025-10-07CybernewsErnestas Naprys
Steam, Riot Games hit by disruptions: massive DDoS attack suspected
Aisuru
2025-10-06BlackPointCaden Toellner, Nevan Beal, Sam Decker
Malicious Node Package Deploys OtterCookie
OtterCookie
2025-10-03TechzineErik van Klinken
What we know so far about Red Hat’s GitLab instance breach
Crimson Collective
2025-10-02TrellixNiranjan Hegde, Sijo Jacob
XWorm V6: Exploring Pivotal Plugins
XWorm
2025-10-02Security AffairsPierluigi Paganini
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories
Crimson Collective
2025-10-02CyberSecurityNewsGuru Baran
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories
Crimson Collective
2025-09-30BloombergEmily Forgash
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says
2025-09-30GoogleAswad Robinson, Bhavesh Dhake, Laith Al, Matthew McWhirt, Michael Rudden, Omar ElAhdan
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations
2025-09-30SynthientSynthient
GhostSocks: From Initial Access to Residential Proxy
GhostSocks Lumma Stealer
2025-09-26BlackPointNevan Beal, Sam Decker
Malicious Teams Installers Drop Oyster Malware
Broomstick
2025-09-25Koi SecurityIdan Dardikman
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails
2025-09-24GoogleAshley Pearson, Austin Larsen, BRAD SLAYBAUGH, Doug Bienstock, Geoff Carstairs, John Wolfram, Josh Madeley, Josh Murchie, Matt Lin, Sarah Yoder
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors
BRICKSTORM
2025-09-24The Hacker NewsRavie Lakshmanan
Chinese Hackers RedNovember Target Global Governments Using Pantegana and Cobalt Strike
Cobalt Strike Leslieloader Pantegana SparkRAT Storm-2077
2025-09-23Bleeping ComputerBill Toulas
Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack
Aisuru
2025-09-23ZscalerZscaler
YiBackdoor: A New Malware Family With Links to IcedID and Latrodectus
YiBackdoor
2025-09-19BlackPointCaden Toellner, Nevan Beal, Sam Decker
KeyZero: A Custom PowerShell RAT
2025-09-19zenseczensec
Unmasking Akira: The ransomware tactics you can’t afford to ignore
Akira Akira