Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-20FBIFBI
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
2026-03-20cocomelonccocomelonc
MacOS malware persistence 6: PAM module injection. Simple C example
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-19cocomelonccocomelonc
MacOS malware persistence 5: cron jobs. Simple C example
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-18ZscalerMuhammed Irfan V A
Technical analysis of SnappyClient
HijackLoader SnappyClient
2026-03-17SeqriteSathwik Ram Prakki
Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency
Unidentified JS 007 (Zimbra Stealer)
2026-03-17Hunt.ioHunt.io
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2
2026-03-17NTT SecurityRintaro Koike, Ryu Hiyoshi
StoatWaffle, malware used by WaterPlum
StoatWaffle
2026-03-16Ransom-ISACFrançois-Julien Alcaraz, Yashraj Solanki
Contagious Interview: VS Code to RAT
StoatWaffle
2026-03-16Ctrl-Alt-IntelCtrl-Alt-Intel
FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops
2026-03-13Scarlet Shark
Analyst’s Brief: Moonrise RAT
MoonRise
2026-03-13kmsecKieran Miyamoto
First instance of PylangGhost RAT observed on npm
PylangGhost
2026-03-12GdataJohn Dador
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
ACR Stealer
2026-03-12Check Point ResearchCheckpoint Research
“Handala Hack” – Unveiling Group’s Modus Operandi
2026-03-11MicrosoftMicrosoft Defender Experts, Microsoft Defender Security Research Team
Contagious Interview: Malware delivered through fake developer job interviews
BeaverTail OtterCookie StoatWaffle InvisibleFerret PylangGhost GolangGhost
2026-03-11Hunt.ioHunt.io
Operation Roundish: Uncovering an APT28 Roundcube Toolkit Used Against Ukrainian Government Targets
2026-03-10AhnLabASEC
Analysis of the Green Blood v2.0 ransomware, which is decryptable
GreenBlood
2026-03-10ZenoX, ZenoX
VENON: The First Brazilian Banker RAT in Rust
VENON
2026-03-10Check Point ResearchCheck Point Research
Iranian MOIS Actors & the Cyber Crime Connection
Qilin Tsundere CASTLELOADER Rhadamanthys