Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-06-12AikidoCharlie Eriksen
A deeper look into the threat actor behind the react-native-aria attack
JADESNOW
2025-06-06AikidoCharlie Eriksen
RATatouille: A Malicious Recipe Hidden in rand-user-agent (Supply Chain Compromise)
JADESNOW
2025-03-31AikidoCharlie Eriksen
Malware hiding in plain sight: Spying on North Korean Hackers
BeaverTail