Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-30US Department of JusticeOffice of Public Affairs
Two Americans Plead Guilty to Targeting Multiple U.S. Victims Using ALPHV BlackCat Ransomware
BlackCat BlackCat
2025-12-09CISACISA
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure
2025-12-09Department of JusticeOffice of Public Affairs
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-09Department of JusticeU.S. Attorney's Office Central District of California
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups
2025-12-04CrowdStrikeCrowdStrike Counter Adversary Operations
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary
BRICKSTORM WARP PANDA
2025-11-15ElasticJia Yu Chan, Salim Bitam
RONINGLOADER: DragonBreath’s New Path to PPL Abuse
DragonBreath RONINGLOADER
2025-10-27Trend MicroEmmanuel Panopio, Jeffrey Francis Bonaobra, Joe Soares
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C
Water Saci
2025-10-21ElasticAndrew Pease, Braxton Williams, Daniel Stepanic, Jia Yu Chan, Salim Bitam, Seth Goodwin
TOLLBOOTH: What's yours, IIS mine
TOLLBOOTH
2025-10-14ReliaquestRELIAQUEST THREAT RESEARCH TEAM
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise
2025-09-30ElasticElastic
WARMCOOKIE One Year Later: New Features and Fresh Insights
WarmCookie
2025-09-25ESET ResearchMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-09-25Virus BulletinMatěj Havránek, Peter Kálnai
DeceptiveDevelopment: From primitive crypto theft to sophisticated AI-based deception
BeaverTail OtterCookie InvisibleFerret PylangGhost AkdoorTea GolangGhost Tropidoor TsunamiKit
2025-07-29ElasticElastic, Jia Yu Chan
MaaS Appeal: An Infostealer Rises From The Ashes
Nova Stealer
2025-07-17Medium Ireneusz TarnowskiIreneusz Tarnowski
Dissecting the ClickFix User-Execution Attack and Its Sophisticated Persistence via ADS
Cobalt Strike
2025-07-08TrellixAkhil Reddy, Alex Lanstein, Alisha Kadam, Aniket Choukde, Aparna Aripirala, Pham Duy Phuc
From Click to Compromise: Unveiling the Sophisticated Attack of DoNot APT Group on Southern European Government Entities
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident
2025-06-18ElasticSalim Bitam
A Wretch Client: From ClickFix deception to information stealer deployment
HijackLoader Lumma Stealer SectopRAT
2025-06-18Huntress LabsAlden Schmidt, Jonathan Semon, Stuart Ashenbrenner
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion
2025-06-16ProofpointJeremy Hedges, Proofpoint Threat Research Team, Tommy Madjar
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication
ACR Stealer Amatera
2025-05-29ElasticJia Yu Chan
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns
EDDIESTEALER