Click here to download all references as Bib-File.•
| 2026-01-29
⋅
Fortninet
⋅
Interlock Ransomware: New Techniques, Same Old Tricks Interlock |
| 2026-01-29
⋅
CrowdStrike
⋅
LABYRINTH CHOLLIMA Evolves into Three Adversaries |
| 2026-01-29
⋅
HarfangLab
⋅
RedKitten: AI-accelerated campaign targeting Iranian protests SloppyMIO |
| 2026-01-28
⋅
Natto Thoughts
⋅
Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations |
| 2026-01-28
⋅
Proofpoint
⋅
Can’t stop, won’t stop: TA584 innovates initial access XWorm TA584 |
| 2026-01-28
⋅
Google
⋅
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network |
| 2026-01-28
⋅
ESET Research
⋅
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan GhostChat |
| 2026-01-27
⋅
Zscaler
⋅
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2 MAILCREEP SHEETCREEP |
| 2026-01-27
⋅
Google
⋅
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 |
| 2026-01-26
⋅
Trend Micro
⋅
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups PeckBirdy GRAYRABBIT |
| 2026-01-26
⋅
KrebsOnSecurity
⋅
Who Operates the Badbox 2.0 Botnet? BADBOX Kimwolf Aisuru |
| 2026-01-26
⋅
Zscaler
⋅
APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1 Cobalt Strike |
| 2026-01-23
⋅
ESET Research
⋅
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025 |
| 2026-01-23
⋅
Zero Day
⋅
Cyberattack Targeting Poland’s Energy Grid Used a Wiper |
| 2026-01-23
⋅
BlackPoint
⋅
Novel Fake CAPTCHA Chain Delivering Amatera Stealer ACR Stealer Amatera |
| 2026-01-20
⋅
Checkpoint
⋅
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun VoidLink |
| 2026-01-20
⋅
Abstract Security
⋅
Contagious Interview: Tracking the VS Code Tasks Infection Vector BeaverTail InvisibleFerret |
| 2026-01-20
⋅
KrebsOnSecurity
⋅
Kimwolf Botnet Lurking in Corporate, Govt. Networks Kimwolf Aisuru |
| 2026-01-20
⋅
FalconFeeds
⋅
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors |
| 2026-01-20
⋅
Jamf Blog
⋅
Threat Actors Expand Abuse of Microsoft Visual Studio Code |