Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-23Bluesky (@esetresearch.bsky.social)ESET Research
Post about DynoWiper activity
2026-01-23BlackPointJack Patrick, Sam Decker
Novel Fake CAPTCHA Chain Delivering Amatera Stealer
ACR Stealer Amatera
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-20Rostelecom-SolarPandora Hive Mind
ShadowRelay – a unique backdoor in the public sector
ShadowPad SNAPPYBEE
2026-01-20CheckpointCheckpoint Research
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
VoidLink
2026-01-20FortinetCara Lin
Inside a Multi-Stage Windows Malware Campaign
Amnesia RAT Hakuna Matata
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20KrebsOnSecurityBrian Krebs
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Kimwolf Aisuru
2026-01-20FalconFeedsFalconFeeds
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors
2026-01-20Jamf BlogThijs Xhaflaire
Threat Actors Expand Abuse of Microsoft Visual Studio Code
2026-01-19Swiss Post CybersecurityLouis Schürmann
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis
PureLogs Stealer
2026-01-19AhnLabASEC
Proxyware Disguised as Notepad++ Tool
Larva‑25012
2026-01-19OpenSourceMalwarePaul McCarty
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware
OtterCandy
2026-01-18malware source codesmelly
Smokest Stealer, a new malware family? Maybe?
Smokest Stealer
2026-01-16WithSecureMohammad Kazem Hassan Nejad
To the past and beyond: Andariel’s latest arsenal and cyberattacks
GopherRAT JelusRAT PetitPotato
2026-01-16sysdigSysdig Threat Research Team
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits
VoidLink
2026-01-15CyberArkAri Novick
UNO reverse card: stealing cookies from cookie stealers
Stealc
2026-01-15ANALYST1Anastasia Sentsova
Infrastructure in the Shadows: How Two Leaks Unmasked the Criminal Network of Yalishanda aka Media Land, and BlackBasta
Black Basta Black Basta
2026-01-15SansecSansec Forensics Team
Keylogger targets 200,000+ employees at major US bank
2026-01-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-8837 targets critical infrastructure sectors in North America
Earthworm Rubeus SharpHound SharpWMI UAT-8837