Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-08Black Lotus LabsDanny Adamitis, Ryan English
FrostArmada: All thriller, no (malware) filler
2026-04-07MicrosoftMicrosoft Threat Intelligence
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
2026-04-07NCSC UKNCSC UK
APT28 exploit routers to enable DNS hijacking operations
2026-04-07Gen DigitalJan Rubín, Vojtěch Krejsa
Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer
Lumma Stealer Remus Tenzor
2026-04-01cocomelonccocomelonc
MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example
2026-03-31GoogleAdrian Hernandez, Ashley Zaya, Austin Larsen, Christopher Gardner, Dima Lenz, Michael Rudden, Mon Liclican, Tyler McLellan
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
WAVESHAPER
2026-03-30SynthientSynthient
ProxyBox: Socks5Systemz Lives On
Socks5 Systemz
2026-03-26ANY.RUNkhr0x, raptur3
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
magecart
2026-03-26Rapid7Rapid7
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
BPFDoor tsh
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-23NetomizeMohamad Mokbel
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient
2026-03-23SophosSophos Counter Threat Unit Research Team
NICKEL ALLEY strategy: Fake it ‘til you make it
PylangGhost GolangGhost
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-17SeqriteSathwik Ram Prakki
Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency
Unidentified JS 007 (Zimbra Stealer)
2026-03-17Hunt.ioHunt.io
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2
2026-03-17NTT SecurityRintaro Koike, Ryu Hiyoshi
StoatWaffle, malware used by WaterPlum
StoatWaffle
2026-03-16Ransom-ISACFrançois-Julien Alcaraz, Yashraj Solanki
Contagious Interview: VS Code to RAT
StoatWaffle
2026-03-13Scarlet Shark
Analyst’s Brief: Moonrise RAT
MoonRise
2026-03-13kmsecKieran Miyamoto
First instance of PylangGhost RAT observed on npm
PylangGhost