Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-8837 targets critical infrastructure sectors in North America
Earthworm Rubeus SharpHound SharpWMI
2026-01-15ExpelAARON WALTON
Planned failure: Gootloader’s malformed ZIP actually works perfectly
GootLoader
2026-01-14MicrosoftMicrosoft Threat Intelligence
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
2026-01-13InfobloxRenée Burton
Kimwolf Howls from Inside the Enterprise
Kimwolf Aisuru
2026-01-13LinkedIn (Majed Ali)Majed Ali
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX
ViperSoftX
2026-01-13Check Point ResearchCheck Point Research
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
VoidLink
2026-01-13Security AllianceSecurity Alliance
VS Code Tasks Abuse by Contagious Interview (DPRK)
BeaverTail InvisibleFerret
2026-01-13SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update July to December 2025
Coper FluBot Joker Aisuru Mirai AsyncRAT BianLian Cobalt Strike DCRat Havoc Latrodectus PureLogs Stealer Quasar RAT Remcos Rhadamanthys Sliver ValleyRAT Venom RAT Vidar XWorm
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-12PolySwarm Tech TeamThe Hivemind
Transparent Tribe Evolves Tradecraft With Multi-Stage LNK Malware
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos
2026-01-12sec0wnMo Bustami
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs)
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-11Red AsgardRed Asgard
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
BeaverTail InvisibleFerret
2026-01-11Reverse The MalwareDiyar Saadi
How Malware Survives: Understanding Watcher and Helper Components
2026-01-11Medium APOPHISMichelle Khalil
ValleyRAT_S2 Chinese campaign
ValleyRAT
2026-01-08CloudseksomedieyoungZZ
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant
Archer RAT
2026-01-08Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7290 targets high value telecommunications infrastructure in South Asia
DriveSwitch RushDrop SilentRaid
2026-01-08FBIIC3
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
2026-01-08KrebsOnSecurityBrian Krebs
Who Benefited from the Aisuru and Kimwolf Botnets?
Kimwolf Aisuru