Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-05-04BlueVoyantJoshua Green, Thomas Elkins
Lorem Ipsum Malware: Trojanized MS Teams Installers Deliver Multi-Stage Loader and Backdoor
Lorem Ipsum
2026-05-04Trend MicroAhmed Mohamed Ibrahim, Aliakbar Zahravi
Quasar Linux (QLNX) – A Silent Foothold in the Supply Chain: Inside a Full-Featured Linux RAT With Rootkit, PAM Backdoor, Credential Harvesting Capabilities
QLNX
2026-05-03Medium Ireneusz TarnowskiIreneusz Tarnowski
Multi-stage malware delivery campaign using SEO poisoning and serverless infrastructure
AMOS
2026-05-01kmsecKieran Miyamoto
North Korea's abuse of Cloudflare Workers and Pages
PylangGhost
2026-05-01Github (zanez)Irvin Martínez González
NotPetya Malware Analysis - Bye, boot partition. I'll miss you
EternalPetya
2026-04-30Trend MicroDaniel Lunghi, Lucas Silva
Inside Shadow-Earth-053: A China-Aligned Cyberespionage Campaign Against Government and Defense Sectors in Asia
FINALDRAFT ShadowPad VShell Shadow-Earth-053
2026-04-30KasperskyAnna Lazaricheva, Anton Kargin, Victoria Vlasova, Vladimir Gursky
Silver Fox uses the new ABCDoor backdoor to target organizations in Russia and India
ABCDoor
2026-04-27cocomelonccocomelonc
MacOS malware persistence 11: osascript LOLBin. Simple C example
OSAMiner
2026-04-27Red PiranhaRed Piranha
Weekly Detected Threats - April 21 - April 27 2026
Lamashtu
2026-04-27Twitter (@suyog41)Yogesh Londhe
Tweet about GeckoStealer
GeckoStealer
2026-04-23ESET ResearchESET Research
GopherWhisper: A burrow full of malware
GopherWhisper
2026-04-23Sentinel LABSJuan Andrés Guerrero-Saade, Vitaly Kamluk
fast16 | Mystery ShadowBrokers Reference Reveals High-Precision Software Sabotage 5 Years Before Stuxnet
fast16
2026-04-23bluecyberSon Vu
MUSTANG PANDA × PLUGX - From deceptive LNK to multi-transport backdoor
PlugX
2026-04-23cocomelonccocomelonc
MacOS malware persistence 10: caffeinate LOLBin. Simple C example
2026-04-23MandiantJosh Kelley, JP Glab, Muhammad Umair, Tufail Ahmed
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
SNOWBASIN UNC6692
2026-04-22Secure BlinkSecure Blink
Mustang Panda Strikes India and South Korea with Updated LOTUSLITE Backdoor in Espionage Campaign
LOTUSLITE
2026-04-22Ransom-ISACAlex Necula, Ellis Stannard
DragonBreath: Dragon in the Kernel
DragonBreath
2026-04-22ExpelMarcus Hutchins
Inside Lazarus: How North Korea uses AI to industrialize attacks on developers
BeaverTail OtterCookie InvisibleFerret HexagonalRodent
2026-04-22Gen Digital IncGen Digital Inc.
When Malware Authors Study Algebra: The Group Theory Inside Bedep's DGA
Bedep
2026-04-21Twitter (@suyog41)Yogesh Londhe
Tweet about VoltStealer
VoltStealer