Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-8837 targets critical infrastructure sectors in North America
Earthworm Rubeus SharpHound SharpWMI UAT-8837
2026-01-08Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7290 targets high value telecommunications infrastructure in South Asia
DriveSwitch RushDrop SilentRaid DAGGER PANDA
2025-12-23secpodSantosh Sethuraman
Zero-Day Crisis: CVE-2025-20393 Unpatched on Cisco Email Gateways, Exploited by China-Linked Hackers
UAT-9686
2025-12-17Cisco TalosCisco Talos
UAT-9686 actively targets Cisco Secure Email Gateway and Secure Email and Web Manager
UAT-9686
2025-12-10The RecordJonathan Greig
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-04CISACanadian Centre for Cyber Security, CISA, NSA
Malware Analysis Report (MAR) BRICKSTORM Backdoor
BRICKSTORM
2025-12-02Trend MicroByron Gelera, Emmanuel Panopio, Ian Kenefick, Jeffrey Francis Bonaobra, Joe Soares, Sarah Pearl Camiling
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp
Water Saci
2025-11-12AmazonCJ Moses
Amazon discovers APT exploiting Cisco and Citrix zero-days
2025-10-27Trend MicroEmmanuel Panopio, Jeffrey Francis Bonaobra, Joe Soares
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C
Water Saci
2025-10-16Cisco TalosMichael Kelley, Vanja Svajcer
BeaverTail and OtterCookie evolve with a new Javascript module
BeaverTail OtterCookie InvisibleFerret
2025-10-15Trend MicroDove Chiu, Lucien Chuang
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits
2025-09-11Trend MicroArmando Nathaniel Pedragoza, Emmanuel Panopio, Emmanuel Roll, Jeffrey Francis Bonaobra, Joshua Aquino, Joshua Lijandro Tsang, Marco Dela Vega, Melvin Singwa, Mohammed Malubay
EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks
TamperedChef
2025-08-27US Department of DefenseCISA
Countering Chinese State-Sponsored Actors Compromise of Networks Worldwide to Feed Global Espionage System
2025-08-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7237 targets Taiwanese web hosting infrastructure
SoundBill UAT-7237
2025-08-12Cisco TalosEdmund Brumaghin, Jordyn Dunk
Malvertising campaign leads to PS1Bot, a multi-stage malware framework
PS1Bot
2025-08-04Beazley Security LabsAlex Delamotte, Bobby Venal, Francisco Donoso, Jim Walter, Sam Mayers, Tell Hause
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
PXA Stealer
2025-08-04Sentinel LABSAlex Delamotte, Bobby Venal, Francisco Donoso, Jim Walter, Sam Mayers, Tell Hause
Ghost in the Zip | New PXA Stealer and Its Telegram-Powered Ecosystem
PXA Stealer
2025-06-18Cisco TalosVanja Svajcer
Famous Chollima deploying Python version of GolangGhost RAT
GolangGhost PylangGhost GolangGhost
2025-06-05Cisco TalosAsheer Malhotra, Dmytro Korzhevin, Jacob Finn
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine
PathWiper