Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-08-22K7 SecurityHarihara Sudhan
Examining the tactics of BQTLOCK Ransomware & its variants
BQTlock
2025-08-21GBHackers on SecurityAman Mishra
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
TamperedChef
2025-08-21Swiss Post CybersecurityLouis Schürmann
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer
donut_injector
2025-08-08K7 SecurityAzhagan K M S
Silent Watcher: Dissecting Cmimai Stealer’s VBS Payload
Cmimai Stealer
2025-07-30GBHackers on SecurityLucas Mancilha
Lazarus Group enhances malware delivery by using new techniques
OtterCookie
2025-07-19Eye SecurityEye Security
SharePoint 0-day uncovered (CVE-2025-53770)
SharPyShell
2025-07-17NJCCICNew Jersey Cybersecurity & Communications Integration Cell
ClickFix Leading to MonsterV2 Infostealer
Aurotun Stealer
2025-07-17Cert-UACert-UA
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039)
LAMEHUG
2025-07-08AcronisAcronis Security
SafePay ransomware: the fast rising threat targeting MSPs
SafePay
2025-07-08Koi SecurityIdan Dardikman
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware.
2025-07-02K7 SecuritySuresh Reddy
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat?
AMOS
2025-06-30ICCICC
ICC detects and contains new sophisticated cyber security incident
2025-06-20K7 SecurityBaran S
SpyMax
SpyMax
2025-06-16SecurityScorecardSTRIKE Team
Checking all the Boxes: LapDogs, The New ORB in Town
ShortLeash ShortLeash
2025-06-14K7 SecurityUma Madasamy
SpectraRansomware
Chaos
2025-06-03K7 SecurityPraveen Babu
In-depth Analysis of a 2025 ViperSoftX Variant
ViperSoftX
2025-05-22KrebsOnSecurityBrian Krebs
Oops: DanaBot Malware Devs Infected Their Own PCs
DanaBot
2025-05-20KrebsOnSecurityBrian Krebs
KrebsOnSecurity Hit With Near-Record 6.3 Tbps DDoS
AIRASHI Aisuru
2025-05-12GeniansGenians
Analysis of APT37 Attack Case Disguised as a Think Tank for National Security Strategy in South Korea (Operation. ToyBox Story)
RokRAT
2025-05-07NTT SecurityMasaya Motoda, Rintaro Koike
Additional Features of OtterCookie Malware Used by WaterPlum
BeaverTail OtterCookie InvisibleFerret