Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-03Kaspersky LabsAnton Kargin, Georgy Kucherin
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Chrysalis Cobalt Strike
2026-02-02Rapid7Ivan Feigl
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Chrysalis
2026-02-02NetresecErik Hjelmvik
njRAT runs MassLogger
MASS Logger NjRAT
2026-02-01Cert-UACert-UA
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542)
GRUNT
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper
2026-01-30LevelBlueEvgeny Ananin, Mark Tsipershtein, Nikita Kazymirskyi
19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware: Part 1
LockBit LockBit
2026-01-30abuse.chabuse.ch
X posting from abuse.ch on Xillen Stealer
Xillen Stealer
2026-01-30CERT.PLCERT.PL
Energy Sector Incident Report – 29 December
LazyWiper DynoWiper
2026-01-29CensysAndrew Northern
AsyncRAT C2 Activity at Internet Scale
AsyncRAT
2026-01-29SekoiaAmaury G., Quentin Bourgue, Sekoia TDR
Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic
IClickFix
2026-01-29FortninetAngelo Deveraturda, Jared Betts, John Simmons, Ken Evans, Mark Robson, Omar Avilez Melo, Xiaopeng Zhang
Interlock Ransomware: New Techniques, Same Old Tricks
Interlock
2026-01-29CrowdStrikeCrowdStrike Threat Intel Team, Rob Bruner
LABYRINTH CHOLLIMA Evolves into Three Adversaries
2026-01-29HarfangLabHarfangLab CTR
RedKitten: AI-accelerated campaign targeting Iranian protests
SloppyMIO
2026-01-28Natto ThoughtsEugenio Benincasa
Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations
2026-01-28ProofpointProofpoint Threat Research Team
Can’t stop, won’t stop: TA584 innovates initial access
XWorm TA584
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-28Hunt.ioHunt.io
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS
2026-01-28ESET ResearchLukáš Štefanko
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
GhostChat
2026-01-28FortinetVincent Li
Unveiling the Weaponized Web Shell EncystPHP
2026-01-27ZscalerSudeep Singh, Yin Hong Chang
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2
MAILCREEP SHEETCREEP