Click here to download all references as Bib-File.•
| 2026-01-12
⋅
sec0wn
⋅
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs) |
| 2026-01-12
⋅
⋅
Cert-UA
⋅
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092) PLUGGYAPE Void Blizzard |
| 2026-01-11
⋅
Red Asgard
⋅
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure BeaverTail InvisibleFerret |
| 2026-01-11
⋅
Reverse The Malware
⋅
How Malware Survives: Understanding Watcher and Helper Components |
| 2026-01-11
⋅
Medium APOPHIS
⋅
ValleyRAT_S2 Chinese campaign ValleyRAT |
| 2026-01-09
⋅
The Hacker News
⋅
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations |
| 2026-01-09
⋅
DARKReading
⋅
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft |
| 2026-01-08
⋅
Cloudsek
⋅
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant Archer RAT |
| 2026-01-08
⋅
Cisco Talos
⋅
UAT-7290 targets high value telecommunications infrastructure in South Asia DriveSwitch RushDrop SilentRaid DAGGER PANDA |
| 2026-01-08
⋅
FBI
⋅
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities |
| 2026-01-08
⋅
KrebsOnSecurity
⋅
Who Benefited from the Aisuru and Kimwolf Botnets? Kimwolf Aisuru |
| 2026-01-07
⋅
MalBeacon
⋅
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations NightshadeC2 |
| 2026-01-07
⋅
Huntress Labs
⋅
The Great VM Escape: ESXi Exploitation in the Wild |
| 2026-01-07
⋅
Recorded Future
⋅
GRU-Linked BlueDelta Evolves Credential Harvesting |
| 2026-01-06
⋅
Reversing Labs
⋅
Unpacking the packer ‘pkr_mtsi’ Broomstick Supper |
| 2026-01-06
⋅
Trellix
⋅
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics CrazyHunter |
| 2026-01-06
⋅
TechCrunch
⋅
Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software pcTattletale |
| 2026-01-06
⋅
Resecurity
⋅
Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters' |
| 2026-01-05
⋅
HudsonRock
⋅
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk |
| 2026-01-05
⋅
SecurityWeek
⋅
Kimwolf Android Botnet Grows Through Residential Proxy Networks Kimwolf |