Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-07MicrosoftMicrosoft Threat Intelligence
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
2026-03-31GoogleAdrian Hernandez, Ashley Zaya, Austin Larsen, Christopher Gardner, Dima Lenz, Michael Rudden, Mon Liclican, Tyler McLellan
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
WAVESHAPER
2026-03-23SophosSophos Counter Threat Unit Research Team
NICKEL ALLEY strategy: Fake it ‘til you make it
PylangGhost GolangGhost
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-09Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2
GolangGhost PylangGhost GolangGhost
2026-03-07OpenSourceMalwareOpenSourceMalware
PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos
JADESNOW
2026-03-06MicrosoftMicrosoft Threat Intelligence
AI as tradecraft: How threat actors operationalize AI
OtterCookie
2026-03-05SymantecThreat Hunter Team
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company
Tsundere
2026-03-05eSentireeSentire Threat Response Unit (TRU)
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')
JADESNOW
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna UNC6353 UNC6691
2026-02-25Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1
BeaverTail PylangGhost GolangGhost
2026-02-24SymantecThreat Hunter Team
North Korean Lazarus Group Now Working With Medusa Ransomware
ComeBacker Medusa
2026-02-19GitLabOliver Smith
GitLab Threat Intelligence Team reveals North Korean tradecraft
BeaverTail OtterCookie Contagious Interview
2026-02-10Cisco TalosAaron Boyd, Asheer Malhotra, Nick Biasini, Vitor Ventura
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
VoidLink UAT-9921
2026-02-05SymantecThreat Hunter Team
Reynolds: Defense Evasion Capability Embedded in Ransomware Payload
Reynolds
2026-01-29CrowdStrikeCrowdStrike Threat Intel Team, Rob Bruner
LABYRINTH CHOLLIMA Evolves into Three Adversaries
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-28ProofpointProofpoint Threat Research Team
Can’t stop, won’t stop: TA584 innovates initial access
XWorm TA584