Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-17Hunt.ioHunt.io
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2
2026-03-11Hunt.ioHunt.io
Operation Roundish: Uncovering an APT28 Roundcube Toolkit Used Against Ukrainian Government Targets
2026-03-05SymantecThreat Hunter Team
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company
Tsundere
2026-03-04Hunt.ioHunt.io
Iranian APT Infrastructure in Focus: Mapping State-Aligned Clusters During Geopolitical Escalation
2026-02-24SymantecThreat Hunter Team
North Korean Lazarus Group Now Working With Medusa Ransomware
ComeBacker Medusa
2026-02-17Hunt.ioHunt.io
Fake Homebrew Typosquats Used to Deliver Cuckoo Stealer via ClickFix
2026-02-16Huntress LabsAnna Pham, Michael Tigges
ClickFix Won't Die. Neither Will Matanbuchus. A New RAT and a Hands-on-Keyboard Intrusion
AstarionRAT Matanbuchus
2026-02-05SymantecThreat Hunter Team
Reynolds: Defense Evasion Capability Embedded in Ransomware Payload
Reynolds
2026-01-30GoogleMandiant
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
UNC6671
2026-01-28Hunt.ioHunt.io
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS
2026-01-22Red AsgardRed Asgard Threat Research Team
Hunting Lazarus Part II: When the Dead Drop Moved to the Blockchain
StoatWaffle
2026-01-14Hunt.ioHunt.io
Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
2026-01-11Red AsgardRed Asgard
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
BeaverTail InvisibleFerret
2026-01-07Huntress LabsAnna Pham, Matt Anderson
The Great VM Escape: ESXi Exploitation in the Wild
2026-01-06TrellixAswath A
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics
CrazyHunter
2026-01-06ResecurityResecurity
Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters'
2025-12-18Huntress LabsAustin Worline, Lindsey O'Donnell-Welch
A Series of Unfortunate (RMM) Events
2025-12-18AcronisAcronis Security
Acronis TRU Alliance {Hunt.io}: Hunting DPRK threats - New Global Lazarus & Kimsuky campaigns
BADCALL POOLRAT Quasar RAT
2025-12-09Huntress LabsJonathan Semon, Stuart Ashenbrenner
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok
AMOS
2025-12-08Trend MicroAliakbar Zahravi
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows
GhostPenguin