Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-05-07R136a1Dominik Reichel
Where Have All the Complex Windows Malware and Their Analyses Gone?
2026-05-05Red AsgardRed Asgard
Hunting Lazarus Part VII: The Server That Was Not Just FTP
BeaverTail OtterCookie
2026-05-05Cisco TalosAsheer Malhotra, Brandon White, Jungsoo An
UAT-8302 and its box full of malware
SNOWLIGHT DracuLoader FINALDRAFT SNAPPYBEE STOWAWAY VShell UAT-8302
2026-05-05OpenSourceMalwareOpenSourceMalware
Lazarus Group Uses Git Hooks To Hide Malware
BeaverTail InvisibleFerret
2026-05-04Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi
Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
QLNX
2026-05-01kmsecKieran Miyamoto
North Korea's abuse of Cloudflare Workers and Pages
PylangGhost
2026-05-01Github (zanez)Irvin Martínez González
NotPetya Malware Analysis - Bye, boot partition. I'll miss you
EternalPetya
2026-04-30KasperskyAnna Lazaricheva, Anton Kargin, Victoria Vlasova, Vladimir Gursky
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
ABCDoor
2026-04-27Red PiranhaRed Piranha
Weekly Detected Threats - April 21 - April 27 2026
2026-04-27Twitter (@suyog41)Yogesh Londhe
Tweet about GeckoStealer
GeckoStealer
2026-04-23ESET ResearchESET Research
GopherWhisper: A burrow full of malware
GopherWhisper
2026-04-23Sentinel LABSJuan Andrés Guerrero-Saade, Vitaly Kamluk
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
fast16
2026-04-23bluecyberSon Vu
MUSTANG PANDA × PLUGX - From deceptive LNK to multi-transport backdoor
PlugX
2026-04-23cocomelonccocomelonc
MacOS malware persistence 10: caffeinate LOLBin. Simple C example
2026-04-23MandiantJosh Kelley, JP Glab, Muhammad Umair, Tufail Ahmed
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
SNOWBASIN UNC6692
2026-04-22ExpelMarcus Hutchins
Inside Lazarus: How North Korea uses AI to industrialize attacks on developers
BeaverTail OtterCookie InvisibleFerret HexagonalRodent
2026-04-22Gen Digital IncGen Digital Inc.
When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA
Bedep
2026-04-21Twitter (@suyog41)Yogesh Londhe
Tweet about VoltStealer
VoltStealer
2026-04-21Trend MicroLucas Silva
Void Dokkaebi Uses Fake Job Interview Lure to Spread Malware via Code Repositories
BeaverTail JADESNOW OtterCookie InvisibleFerret
2026-04-20Twitter (@suyog41)Yogesh Londhe
Tweet about LedgerChecker Stealer
LedgerChecker Stealer