Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-12sec0wnMo Bustami
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs)
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-11Red AsgardRed Asgard
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
BeaverTail InvisibleFerret
2026-01-11Reverse The MalwareDiyar Saadi
How Malware Survives: Understanding Watcher and Helper Components
2026-01-11Medium APOPHISMichelle Khalil
ValleyRAT_S2 Chinese campaign
ValleyRAT
2026-01-09The Hacker NewsRavie Lakshmanan
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
2026-01-09DARKReadingNate Nelson
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
2026-01-08CloudseksomedieyoungZZ
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant
Archer RAT
2026-01-08Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7290 targets high value telecommunications infrastructure in South Asia
DriveSwitch RushDrop SilentRaid DAGGER PANDA
2026-01-08FBIIC3
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
2026-01-08KrebsOnSecurityBrian Krebs
Who Benefited from the Aisuru and Kimwolf Botnets?
Kimwolf Aisuru
2026-01-07MalBeaconMalBeacon
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations
NightshadeC2
2026-01-07Huntress LabsAnna Pham, Matt Anderson
The Great VM Escape: ESXi Exploitation in the Wild
2026-01-07Recorded FutureInsikt Group
GRU-Linked BlueDelta Evolves Credential Harvesting
2026-01-06Reversing LabsRobert Simmons
Unpacking the packer ‘pkr_mtsi’
Broomstick Supper
2026-01-06TrellixAswath A
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics
CrazyHunter
2026-01-06TechCrunchZack Whittaker
Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software
pcTattletale
2026-01-06ResecurityResecurity
Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters'
2026-01-05HudsonRockInfoStealers
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
2026-01-05SecurityWeekIonut Arghire
Kimwolf Android Botnet Grows Through Residential Proxy Networks
Kimwolf