Click here to download all references as Bib-File.•
| 2026-05-04
⋅
BlueVoyant
⋅
Lorem Ipsum Malware: Trojanized MS Teams Installers Deliver Multi-Stage Loader and Backdoor Lorem Ipsum |
| 2026-05-04
⋅
Trend Micro
⋅
Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities QLNX |
| 2026-05-03
⋅
Medium Ireneusz Tarnowski
⋅
Multi-stage malware delivery campaign using SEO poisoning and serverless infrastructure AMOS |
| 2026-05-01
⋅
kmsec
⋅
North Korea's abuse of Cloudflare Workers and Pages PylangGhost |
| 2026-05-01
⋅
Github (zanez)
⋅
NotPetya Malware Analysis - Bye, boot partition. I'll miss you EternalPetya |
| 2026-04-30
⋅
Trend Micro
⋅
Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia FINALDRAFT ShadowPad VShell Shadow-Earth-053 |
| 2026-04-30
⋅
Kaspersky
⋅
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India ABCDoor |
| 2026-04-27
⋅
cocomelonc
⋅
MacOS malware persistence 11: osascript LOLBin. Simple C example OSAMiner |
| 2026-04-27
⋅
Red Piranha
⋅
Weekly Detected Threats - April 21 - April 27 2026 Lamashtu |
| 2026-04-27
⋅
Twitter (@suyog41)
⋅
Tweet about GeckoStealer GeckoStealer |
| 2026-04-23
⋅
ESET Research
⋅
GopherWhisper: A burrow full of malware GopherWhisper |
| 2026-04-23
⋅
Sentinel LABS
⋅
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet fast16 |
| 2026-04-23
⋅
bluecyber
⋅
MUSTANG PANDA × PLUGX - From deceptive LNK to multi-transport backdoor PlugX |
| 2026-04-23
⋅
cocomelonc
⋅
MacOS malware persistence 10: caffeinate LOLBin. Simple C example |
| 2026-04-23
⋅
Mandiant
⋅
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite SNOWBASIN UNC6692 |
| 2026-04-22
⋅
Secure Blink
⋅
Mustang Panda Strikes India and South Korea with Updated LOTUSLITE Backdoor in Espionage Campaign LOTUSLITE |
| 2026-04-22
⋅
Ransom-ISAC
⋅
DragonBreath: Dragon in the Kernel DragonBreath |
| 2026-04-22
⋅
Expel
⋅
Inside Lazarus: How North Korea uses AI to industrialize attacks on developers BeaverTail OtterCookie InvisibleFerret HexagonalRodent |
| 2026-04-22
⋅
Gen Digital Inc
⋅
When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA Bedep |
| 2026-04-21
⋅
Twitter (@suyog41)
⋅
Tweet about VoltStealer VoltStealer |