Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20FalconFeedsFalconFeeds
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors
2026-01-20Jamf BlogThijs Xhaflaire
Threat Actors Expand Abuse of Microsoft Visual Studio Code
2026-01-16WithSecureMohammad Kazem Hassan Nejad
To the past and beyond: Andariel’s latest arsenal and cyberattacks
GopherRAT JelusRAT PetitPotato
2026-01-15ANALYST1Anastasia Sentsova
Infrastructure in the Shadows: How Two Leaks Unmasked the Criminal Network of Yalishanda aka Media Land, and BlackBasta
Black Basta Black Basta
2026-01-15ExpelAARON WALTON
Planned failure: Gootloader’s malformed ZIP actually works perfectly
GootLoader
2026-01-14Hunt.ioHunt.io
Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
2026-01-14TrellixMallikarjun Wali, Mohideen Abdul Khader
Hiding in Plain Sight: Deconstructing the Multi-Actor DLL Sideloading Campaign abusing ahost.exe
DCRat
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-13LinkedIn (Majed Ali)Majed Ali
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX
ViperSoftX
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-09The Hacker NewsRavie Lakshmanan
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
2026-01-08FBIIC3
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
2026-01-07MalBeaconMalBeacon
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations
NightshadeC2
2026-01-06Reversing LabsRobert Simmons
Unpacking the packer ‘pkr_mtsi’
Broomstick Supper
2026-01-06TrellixAswath A
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics
CrazyHunter
2026-01-06TechCrunchZack Whittaker
Founder of spyware maker pcTattletale pleads guilty to hacking and advertising surveillance software
pcTattletale
2026-01-05HudsonRockInfoStealers
Dozens of Global Companies Hacked via Cloud Credentials from Infostealer Infections & More at Risk
2025-12-30BotcrawlSean Doyle
Saudi Icon Data Breach Exposes 4.15TB in Alleged Kazu Ransomware Attack
Kazu