Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-13Security AllianceSecurity Alliance
VS Code Tasks Abuse by Contagious Interview (DPRK)
BeaverTail InvisibleFerret
2026-01-13SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update July to December 2025
Coper FluBot Joker Aisuru Mirai AsyncRAT BianLian Cobalt Strike DCRat Havoc Latrodectus PureLogs Stealer Quasar RAT Remcos Rhadamanthys Sliver ValleyRAT Venom RAT Vidar XWorm
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-12PolySwarm Tech TeamThe Hivemind
Transparent Tribe Evolves Tradecraft With Multi-Stage LNK Malware
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos
2026-01-12sec0wnMo Bustami
PART 2 - From a New Year's surprise to a bag of coal - Analysis of mystery PowerShell (Never trust LLMs)
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-11Red AsgardRed Asgard
Hunting Lazarus: Inside the Contagious Interview C2 Infrastructure
BeaverTail InvisibleFerret
2026-01-11Reverse The MalwareDiyar Saadi
How Malware Survives: Understanding Watcher and Helper Components
2026-01-11Medium APOPHISMichelle Khalil
ValleyRAT_S2 Chinese campaign
ValleyRAT
2026-01-09The Hacker NewsRavie Lakshmanan
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
2026-01-09DARKReadingNate Nelson
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
2026-01-08CloudseksomedieyoungZZ
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant
Archer RAT
2026-01-08Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-7290 targets high value telecommunications infrastructure in South Asia
DriveSwitch RushDrop SilentRaid DAGGER PANDA
2026-01-08FBIIC3
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
2026-01-08KrebsOnSecurityBrian Krebs
Who Benefited from the Aisuru and Kimwolf Botnets?
Kimwolf Aisuru
2026-01-07MalBeaconMalBeacon
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations
NightshadeC2
2026-01-07Huntress LabsAnna Pham, Matt Anderson
The Great VM Escape: ESXi Exploitation in the Wild
2026-01-07Recorded FutureInsikt Group
GRU-Linked BlueDelta Evolves Credential Harvesting
2026-01-06Reversing LabsRobert Simmons
Unpacking the packer ‘pkr_mtsi’
Broomstick Supper