Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-13kmsecKieran Miyamoto
VMWare artifacts left by a FAMOUS CHOLLIMA operator
2026-02-12SekoiaPierre Le Bourhis
OysterLoader Unmasked: The Multi-Stage Evasion Loader
Broomstick
2026-02-12LevelBlueRodel Mendrez
How ClickFix Opens the Door to Stealthy StealC Information Stealer
IClickFix Stealc
2026-02-11IsovalentJeremy Colvin
Deconstructing Voidlink: Why New AI and Cloud-Native Threats Require a New Class of Defense
VoidLink UAT-9921
2026-02-11BitdefenderBogdan Ionut Lazar, Janos Gergo Szeles, Manuel Dragomir
LummaStealer Is Getting a Second Life Alongside CastleLoader
CASTLELOADER Lumma Stealer
2026-02-10Cisco TalosAaron Boyd, Asheer Malhotra, Nick Biasini, Vitor Ventura
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
VoidLink UAT-9921
2026-02-09MandiantAdrian Hernandez, Ross Inman
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
SUGARLOADER WAVESHAPER
2026-02-09TRUESECAndreas Törnqvist, Mattias Wåhlén, Nicklas Keijser
Detecting Russian Threats to Critical Energy Infrastructure
DynoWiper
2026-02-06t0ast's blogt0ast
DynoWiper: From Russia with Love
DynoWiper
2026-02-05Palo Alto Networks Unit 42Unit 42
The Shadow Campaigns: Uncovering Global Espionage
Cobalt Strike UNC6619
2026-02-05Bleeping ComputerBill Toulas
Italian university La Sapienza goes offline after cyberattack
Rorschach Ransomware Femwar02
2026-02-05SymantecThreat Hunter Team
Black Basta: Defense Evasion Capability Embedded in Ransomware Payload
Black Basta
2026-02-04Check Point ResearchCheck Point Research
Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia
Amaranth-Dragon
2026-02-04safebreachTomer Bar
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout
Infy StormKittyRAT
2026-02-03LevelBlueEvgeny Ananin, Mark Tsipershtein
The Godfather of Ransomware? Inside DragonForce’s Cartel Ambitions
DragonForce
2026-02-03Kaspersky LabsAnton Kargin, Georgy Kucherin
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Chrysalis Cobalt Strike
2026-02-02Rapid7Ivan Feigl
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Chrysalis
2026-02-02NetresecErik Hjelmvik
njRAT runs MassLogger
MASS Logger NjRAT
2026-02-01Cert-UACert-UA
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542)
GRUNT
2026-01-30GoogleMandiant
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
UNC6671