Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2025-12-17XLabAcey9, Alex.Turing, RootKiter, Wang Hao
Kimwolf Exposed: The Massive Android Botnet with 1.8 Million Infected Devices
Kimwolf Aisuru
2025-12-10zimperiumVishnu Pratapagiri
Total Takeover: DroidLock Hijacks Your Device
DroidLock
2025-11-26FortiGuard LabsVincent Li
ShadowV2 Casts a Shadow Over IoT Devices
ShadowV2
2025-11-19ESET ResearchDávid Gábriš, Facundo Muñoz
PlushDaemon compromises network devices for adversary-in-the-middle attacks
EdgeStepper LittleDaemon
2025-11-13NVISO LabsBart Parys, Efstratios Lontzetidis, Stef Collart
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery
BeaverTail OtterCookie InvisibleFerret Beavertail TsunamiKit
2025-11-11BotcrawlSean Doyle
National Civil Service Commission of Colombia Data Breach Exposes 2.9 TB of Government Files
Kazu
2025-11-10GeniansGenians
State-Sponsored Remote Wipe Tactics Targeting Android Devices
Quasar RAT Remcos
2025-11-07Unit 42
LANDFALL: New Commercial-Grade Android Spyware in Exploit Chain Targeting Samsung Devices
LANDFALL
2025-10-14CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Adversaries Target Ukrainian Defence Forces and Local Authorities Using "Counter-Sabotage" Lure
UAC-0239
2025-10-08CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
New cyber threats: who and how to attack enemy groups
WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227
2025-09-30CIPState Service of Special Communication and Information Protection of Ukraine (CIP)
Russian Cyber Operations
WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer
2025-09-02At-BayAaron Smith, Laurie Iacono, MC, Ricardo Vazquez, Rohit Pappali, Will Botto, Yiwei Guo
Rhysida: Evading Detection, One Service at a Time
Rhysida
2025-08-21GBHackers on SecurityAman Mishra
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies
TamperedChef
2025-08-18Medium RaghavtiResearchBeGoodToAll
Qilin Ransomware-as-a-Service: Threat Analysis and Strategic Outlook
Qilin AgendaCrypt
2025-07-14Arda BüyükkayaEclecticIQ Threat Research Team
GLOBAL GROUP: Emerging Ransomware-as-a-Service, Supporting AI Driven Negotiation and Mobile Control Panel for Their Affiliates
Global
2025-07-12t0ast's blogt0ast
Global Group: Ransomware-as-a-Service with AI-powered Negotiation
Global
2025-07-02CrowdStrikeCounter Adversary Operations
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries
2025-06-29Medium Sapir TwigSapir Twig
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat
DarkGate
2025-06-05FBIFBI
Alert Number: I-060525-PSA - Home Internet Connected Devices Facilitate Criminal Activity
BADBOX
2025-05-28DarktraceTara Gould
PumaBot: Novel Botnet Targeting IoT Surveillance Devices
PumaBot