Click here to download all references as Bib-File.•
| 2026-03-12
⋅
Check Point Research
⋅
“Handala Hack” – Unveiling Group’s Modus Operandi |
| 2026-03-11
⋅
Microsoft
⋅
Contagious Interview: Malware delivered through fake developer job interviews BeaverTail OtterCookie StoatWaffle InvisibleFerret PylangGhost GolangGhost Contagious Interview |
| 2026-03-11
⋅
Hunt.io
⋅
Operation Roundish: Uncovering an APT28 Roundcube Toolkit Used Against Ukrainian Government Targets |
| 2026-03-10
⋅
ZenoX
⋅
VENON: The First Brazilian Banker RAT in Rust VENON |
| 2026-03-10
⋅
Check Point Research
⋅
Iranian MOIS Actors & the Cyber Crime Connection Qilin Tsundere CASTLELOADER Rhadamanthys |
| 2026-03-10
⋅
Lumen
⋅
Silence of the hops: The KadNap botnet KadNap |
| 2026-03-10
⋅
ESET Research
⋅
Sednit reloaded: Back in the trenches BEARDSHELL GRUNT SLIMAGENT X-Agent XTunnel |
| 2026-03-09
⋅
Abstract Security
⋅
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2 GolangGhost PylangGhost GolangGhost |
| 2026-03-07
⋅
OpenSourceMalware
⋅
PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos JADESNOW |
| 2026-03-05
⋅
Symantec
⋅
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company Tsundere |
| 2026-03-05
⋅
eSentire
⋅
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin') JADESNOW |
| 2026-03-04
⋅
EG-FinCirt
⋅
Remcos RAT Operations: How Attackers Gain and Maintain Control Remcos |
| 2026-03-03
⋅
Google
⋅
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit Coruna |
| 2026-03-03
⋅
Google
⋅
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit Coruna UNC6353 UNC6691 |
| 2026-03-03
⋅
Microsoft
⋅
Signed malware impersonating workplace apps deploys RMM backdoors TrustConnect RAT |
| 2026-03-02
⋅
Moonlock
⋅
Fake VCs target crypto talent in a new ClickFix campaign AmodalTea |
| 2026-03-02
⋅
ClearSky
⋅
Exposing a Russian Campaign Targeting Ukraine Using New Malware Duo: BadPaw and MeowMeow BadPaw |
| 2026-02-28
⋅
Github (cocomelonc)
⋅
MacOS malware persistence 4: AutoLaunched Applications, Background Task Management (BTM). Simple C example |
| 2026-02-27
⋅
Intrinsec
⋅
Analysis of AuraStealer, an emerging infostealer Aura Stealer |
| 2026-02-26
⋅
kmsec
⋅
Novel DPRK stager using Pastebin and text steganography |