Click here to download all references as Bib-File.•
| 2026-01-15
⋅
Cisco Talos
⋅
UAT-8837 targets critical infrastructure sectors in North America Earthworm Rubeus SharpHound SharpWMI |
| 2026-01-15
⋅
Expel
⋅
Planned failure: Gootloader’s malformed ZIP actually works perfectly GootLoader |
| 2026-01-14
⋅
Microsoft
⋅
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations |
| 2026-01-13
⋅
Infoblox
⋅
Kimwolf Howls from Inside the Enterprise Kimwolf Aisuru |
| 2026-01-13
⋅
LinkedIn (Majed Ali)
⋅
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX ViperSoftX |
| 2026-01-13
⋅
Check Point Research
⋅
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework VoidLink |
| 2026-01-13
⋅
Security Alliance
⋅
VS Code Tasks Abuse by Contagious Interview (DPRK) BeaverTail InvisibleFerret |
| 2026-01-13
⋅
Spamhaus
⋅
Spamhaus Botnet Threat Update July to December 2025 Coper FluBot Joker Aisuru Mirai AsyncRAT BianLian Cobalt Strike DCRat Havoc Latrodectus PureLogs Stealer Quasar RAT Remcos Rhadamanthys Sliver ValleyRAT Venom RAT Vidar XWorm |
| 2026-01-13
⋅
SecurityLiterate
⋅
Deceiving the Deceivers: A Review of Deception Pro Formbook |
| 2026-01-12
⋅
PolySwarm Tech Team
⋅
Transparent Tribe Evolves Tradecraft With Multi-Stage LNK Malware |
| 2026-01-12
⋅
Securonix
⋅
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment Remcos |
| 2026-01-12
⋅
sec0wn
⋅
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs) |
| 2026-01-12
⋅
⋅
Cert-UA
⋅
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092) PLUGGYAPE Void Blizzard |
| 2026-01-11
⋅
Red Asgard
⋅
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure BeaverTail InvisibleFerret |
| 2026-01-11
⋅
Reverse The Malware
⋅
How Malware Survives: Understanding Watcher and Helper Components |
| 2026-01-11
⋅
Medium APOPHIS
⋅
ValleyRAT_S2 Chinese campaign ValleyRAT |
| 2026-01-08
⋅
Cloudsek
⋅
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant Archer RAT |
| 2026-01-08
⋅
Cisco Talos
⋅
UAT-7290 targets high value telecommunications infrastructure in South Asia DriveSwitch RushDrop SilentRaid |
| 2026-01-08
⋅
FBI
⋅
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities |
| 2026-01-08
⋅
KrebsOnSecurity
⋅
Who Benefited from the Aisuru and Kimwolf Botnets? Kimwolf Aisuru |