Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-05HudsonRockInfoStealers
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
2025-12-16R3dy's BlogPaul Viard
Gozi Gozi Gozi - String Decryption
Gozi ISFB
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-09-11Trend MicroArmando Nathaniel Pedragoza, Emmanuel Panopio, Emmanuel Roll, Jeffrey Francis Bonaobra, Joshua Aquino, Joshua Lijandro Tsang, Marco Dela Vega, Melvin Singwa, Mohammed Malubay
EvilAI Operators Use AI-Generated Code and Fake Apps for Far-Reaching Attacks
TamperedChef
2025-07-31MicrosoftMicrosoft Threat Intelligence
Frozen in transit: Secret Blizzard’s AiTM campaign against diplomats
ApolloShadow
2025-05-31The InsiderChristo Grozev, Michael Weiss, Roman Dobrokhotov
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad
2025-05-20AcronisJozsef Gegeny, Prakas Thevendaran, Santiago Pontiroli
From banks to battalions: SideWinder’s attacks on South Asia’s public sector
2025-05-07US Department of JusticeU.S. Attorney's Officea Northern District of Oklahoma
Case 4:25-cr-00160-JDR: Indictment of Alexey Viktorovich Chertkov, Kirill Vladimirovich Morozov, Aleksandr Aleksandrovich Shishkin and Dmitriy Rubtsov
TheMoon
2025-04-30ESET ResearchFacundo Muñoz
TheWizards APT group uses SLAAC spoofing to perform adversary-in-the-middle attacks
TheWizards
2025-03-12MandiantFrank Tse, Jakub Jozwiak, Logeswaran Nadarajan, Lukasz Lamparski, Mathew Potaczek, Mustafa Nasser, Nick Harbour, Punsaen Boonyakarn, Shawn Chew
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers
tsh
2025-01-22ESET ResearchFacundo Muñoz
PlushDaemon compromises supply chain of Korean VPN service
SlowStepper PlushDaemon
2025-01-08ThreatMonAlp Cihangir Aslan, Aziz Kaplan, Ozan Ünal, ThreatMon, ThreatMon Malware Research Team
Akira Ransomware Group & Malware Analysis Report
Akira
2024-11-11KasperskyAshley Muñoz, Cristian Souza, Eduardo Ovalle
Ymir: new stealthy ransomware in the wild
Ymir
2024-11-09Youtube (Microsoft Security Response Center (MSRC))Rachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0506 TA2101
2024-11-09MicrosoftRachel Giacobozzi
BlueHat 2024: S17: MSTIC - A Threat Intelligence Year in Review
Storm-0826
2024-11-06CloudsekCloudsek
Mozi Resurfaces as Androxgh0st Botnet: Unraveling The Latest Exploitation Wave
Mozi
2024-10-03GitHub (dstepanic)Daniel Stepanic
Getting Cozy with Milk and WARMCOOKIES
WarmCookie
2024-09-20Trend MicroCharles Adrian Marty, Christian Alpuerto, John Paul Lim, Kyle Philippe Yu, Mark Chester De Quiroz, Mohammed Malubay
How Ransomhub Ransomware Uses EDRKillShifter to Disable EDR and Antivirus Protections
RansomHub Water Bakunawa
2024-08-19AonDaniel Stein, Joshua Pivirotto, Stroz Friedberg, Zachary Reichert
Unveiling "sedexp": A Stealthy Linux Malware Exploiting udev Rules
sedexp