Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-27GoogleGoogle Threat Intelligence Group
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
2026-01-26Trend MicroJoseph C Chen, Ted Lee
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
PeckBirdy GRAYRABBIT
2026-01-26KrebsOnSecurityBrian Krebs
Who Operates the Badbox 2.0 Botnet?
BADBOX Kimwolf Aisuru
2026-01-26ZscalerSudeep Singh, Yin Hong Chang
APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1
Cobalt Strike
2026-01-23ESET ResearchESET Research
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
2026-01-23Zero DayKim Zetter
Cyberattack Targeting Poland’s Energy Grid Used a Wiper
2026-01-23Bluesky (@esetresearch.bsky.social)ESET Research
Post about DynoWiper activity
2026-01-23BlackPointJack Patrick, Sam Decker
Novel Fake CAPTCHA Chain Delivering Amatera Stealer
ACR Stealer Amatera
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-20Rostelecom-SolarPandora Hive Mind
ShadowRelay – a unique backdoor in the public sector
ShadowPad SNAPPYBEE
2026-01-20CheckpointCheckpoint Research
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
VoidLink
2026-01-20FortinetCara Lin
Inside a Multi-Stage Windows Malware Campaign
Amnesia RAT Hakuna Matata
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20KrebsOnSecurityBrian Krebs
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Kimwolf Aisuru
2026-01-20FalconFeedsFalconFeeds
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors
2026-01-20Jamf BlogThijs Xhaflaire
Threat Actors Expand Abuse of Microsoft Visual Studio Code
2026-01-19Swiss Post CybersecurityLouis Schürmann
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis
PureLogs Stealer
2026-01-19AhnLabASEC
Proxyware Disguised as Notepad++ Tool
Larva‑25012
2026-01-19OpenSourceMalwarePaul McCarty
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware
OtterCandy
2026-01-18malware source codesmelly
Smokest Stealer, a new malware family? Maybe?
Smokest Stealer