Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-07NCSC UKNCSC UK
APT28 exploit routers to enable DNS hijacking operations
2026-04-06PICUS SecurityUmut Bayram
How NoName057(16) Uses DDoSia to Attack NATO Targets
Z-Pentest Alliance
2026-04-03Trend MicroJacob Santos, Jeffrey Francis Bonaobra, Sophia Nilette Robles
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
GhostSocks Vidar
2026-04-02cocomelonccocomelonc
MacOS malware persistence 8: periodic scripts. Simple C example
2026-04-02tracebitAlessandro Brucato
Detecting CI/CD Supply Chain Attacks with Canary Credentials
TeamPCP
2026-04-01SOC PrimeDaryna Olyniychuk
UAC-0255 Attack Detection: Threat Actors Impersonate CERT-UA to Infect Ukrainian Public and Private Sector Organizations With AGEWHEEZE RAT
AGEWHEEZE Cyber Serp
2026-04-01cocomelonccocomelonc
MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example
2026-03-31GoogleAdrian Hernandez, Ashley Zaya, Austin Larsen, Christopher Gardner, Dima Lenz, Michael Rudden, Mon Liclican, Tyler McLellan
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
WAVESHAPER
2026-03-30Trend MicroJohn Rainier Navato
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
TeamPCP
2026-03-29Cert-UACert-UA
UAC-0255 cyberattack disguised as a notification from CERT-UA using the AGEWHEEZE software tool (CERT-UA#21075)
AGEWHEEZE Cyber Serp
2026-03-29cocomelonccocomelonc
MacOS malware persistence 7: Re-opened applications. Simple C example
2026-03-26SOCRadarSOCRadar
Telegram Hacktivist Activity Timeline of Iran – Israel & US War
313 Team Conquerors Electronic Army Cyber Islamic Resistance Keymous+ Z-Pentest Alliance
2026-03-26The RecordDaryna Antoniuk
Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware
Babuk LockBit Bearlyfy
2026-03-26Trend MicroAshish Verma, Deep Patel, Fernando Tucci, John Rainier Navato, Peter Girnus, Simon Dulude
Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise
TeamPCP
2026-03-26DarktraceIsabel Evans
Phantom Footprints: Tracking GhostSocks Malware
GhostSocks Lumma Stealer
2026-03-26ANY.RUNkhr0x, raptur3
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
magecart
2026-03-26Rapid7Rapid7
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
BPFDoor tsh
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-23NetskopeVini Egerland
OpenClaw Trap: AI-Assisted Lure Factory Targets Developers & Gamers
2026-03-23NetomizeMohamad Mokbel
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient