Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-08Black Lotus LabsDanny Adamitis, Ryan English
FrostArmada: All thriller, no (malware) filler
2026-04-07MicrosoftMicrosoft Threat Intelligence
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
2026-04-07IC3CISA, CNMF, Department of Energy (DOE), EPA, FBI, NSA
AA26-097A: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
2026-04-07NCSC UKNCSC UK
APT28 exploit routers to enable DNS hijacking operations
2026-04-07Gen DigitalJan Rubín, Vojtěch Krejsa
Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer
Lumma Stealer Remus Tenzor
2026-04-050x3oBADAbdullah Islam
Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment
Payload
2026-04-01cocomelonccocomelonc
MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example
2026-03-31GoogleAdrian Hernandez, Ashley Zaya, Austin Larsen, Christopher Gardner, Dima Lenz, Michael Rudden, Mon Liclican, Tyler McLellan
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
WAVESHAPER
2026-03-30SynthientSynthient
ProxyBox: Socks5Systemz Lives On
Socks5 Systemz
2026-03-29cocomelonccocomelonc
MacOS malware persistence 7: Re-opened applications. Simple C example
2026-03-26ANY.RUNkhr0x, raptur3
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
magecart
2026-03-26Rapid7Rapid7
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
BPFDoor tsh
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-23NetomizeMohamad Mokbel
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient
2026-03-23SophosSophos Counter Threat Unit Research Team
NICKEL ALLEY strategy: Fake it ‘til you make it
PylangGhost GolangGhost
2026-03-20IC3FBI, IC3
I-032026-PSA: Russian Intelligence Services Target Commercial Messaging Application Accounts
2026-03-20FBIFBI
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
2026-03-20cocomelonccocomelonc
MacOS malware persistence 6: PAM module injection. Simple C example
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-19cocomelonccocomelonc
MacOS malware persistence 5: cron jobs. Simple C example