Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-01Midnight Blue LabsMidnight Blue
Have you tried turning it off and on again? On bricking OT devices (part 1)
2026-02-01splintersfuryAhmad Abdillah Bin Zaini
KernelSight: Windows Kernel Driver Exploitation Knowledge Base
BlackByte FudModule Nokoyawa Ransomware
2026-02-01Cert-UACert-UA
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542)
GRUNT
2026-01-31Github (cocomelonc)cocomelonc
MacOS malware persistence 2: shell environment hijacking. Simple C example
2026-01-30GoogleMandiant
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
UNC6671
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper
2026-01-30LevelBlueEvgeny Ananin, Mark Tsipershtein, Nikita Kazymirskyi
19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware: Part 1
LockBit LockBit
2026-01-30abuse.chabuse.ch
X posting from abuse.ch on Xillen Stealer
Xillen Stealer
2026-01-30CERT.PLCERT.PL
Energy Sector Incident Report – 29 December
LazyWiper DynoWiper
2026-01-29Cisco TalosJoey Chen
Dissecting UAT-8099: New persistence mechanisms and regional focus
UAT-8099
2026-01-29CensysAndrew Northern
AsyncRAT C2 Activity at Internet Scale
AsyncRAT
2026-01-29SekoiaAmaury G., Quentin Bourgue, Sekoia TDR
Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic
IClickFix
2026-01-29FortninetAngelo Deveraturda, Jared Betts, John Simmons, Ken Evans, Mark Robson, Omar Avilez Melo, Xiaopeng Zhang
Interlock Ransomware: New Techniques, Same Old Tricks
Interlock
2026-01-29CrowdStrikeCrowdStrike Threat Intel Team, Rob Bruner
LABYRINTH CHOLLIMA Evolves into Three Adversaries
2026-01-29HarfangLabHarfangLab CTR
RedKitten: AI-accelerated campaign targeting Iranian protests
SloppyMIO RedKitten
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-28Natto ThoughtsEugenio Benincasa
Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations
2026-01-28ProofpointProofpoint Threat Research Team
Can’t stop, won’t stop: TA584 innovates initial access
XWorm TA584
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-28Hunt.ioHunt.io
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS