Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20KrebsOnSecurityBrian Krebs
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Kimwolf Aisuru
2026-01-20FalconFeedsFalconFeeds
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors
2026-01-18malware source codesmelly
Smokest Stealer, a new malware family? Maybe?
Smokest Stealer
2026-01-15CyberArkAri Novick
UNO reverse card: stealing cookies from cookie stealers
Stealc
2026-01-15ANALYST1Anastasia Sentsova
Infrastructure in the Shadows: How Two Leaks Unmasked the Criminal Network of Yalishanda aka Media Land, and BlackBasta
Black Basta Black Basta
2026-01-15SansecSansec Forensics Team
Keylogger targets 200,000+ employees at major US bank
2026-01-15ExpelAARON WALTON
Planned failure: Gootloader’s malformed ZIP actually works perfectly
GootLoader
2026-01-14Jamf BlogNir Avraham, Shen Yuan
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware
Predator
2026-01-14R136a1Dominik Reichel
COMmand & Evade: Turla's Kazuar v3 Loader
Kazuar
2026-01-14TrellixMallikarjun Wali, Mohideen Abdul Khader
Hiding in Plain Sight: Deconstructing the Multi-Actor DLL Sideloading Campaign abusing ahost.exe
DCRat
2026-01-14MicrosoftMicrosoft Threat Intelligence
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-13InfobloxRenée Burton
Kimwolf Howls from Inside the Enterprise
Kimwolf Aisuru
2026-01-13LinkedIn (Majed Ali)Majed Ali
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX
ViperSoftX
2026-01-13Check Point ResearchCheck Point Research
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
VoidLink
2026-01-13Security AllianceSecurity Alliance
VS Code Tasks Abuse by Contagious Interview (DPRK)
BeaverTail InvisibleFerret
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-12PolySwarm Tech TeamThe Hivemind
Transparent Tribe Evolves Tradecraft With Multi-Stage LNK Malware
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos