Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-23BlackPointJack Patrick, Sam Decker
Novel Fake CAPTCHA Chain Delivering Amatera Stealer
ACR Stealer Amatera
2026-01-20CheckpointCheckpoint Research
VoidLink: Evidence That the Era of Advanced AI-Generated Malware Has Begun
VoidLink
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20KrebsOnSecurityBrian Krebs
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Kimwolf Aisuru
2026-01-20FalconFeedsFalconFeeds
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors
2026-01-20Jamf BlogThijs Xhaflaire
Threat Actors Expand Abuse of Microsoft Visual Studio Code
2026-01-16WithSecureMohammad Kazem Hassan Nejad
To the past and beyond: Andariel’s latest arsenal and cyberattacks
GopherRAT JelusRAT PetitPotato
2026-01-16sysdigSysdig Threat Research Team
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits
VoidLink
2026-01-15SansecSansec Forensics Team
Keylogger targets 200,000+ employees at major US bank
2026-01-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-8837 targets critical infrastructure sectors in North America
Earthworm Rubeus SharpHound SharpWMI UAT-8837
2026-01-14Jamf BlogNir Avraham, Shen Yuan
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware
Predator
2026-01-14MicrosoftMicrosoft Threat Intelligence
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
2026-01-13Check Point ResearchCheck Point Research
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
VoidLink
2026-01-13SpamhausSpamhaus Malware Labs
Spamhaus Botnet Threat Update July to December 2025
Coper FluBot Joker Aisuru Mirai AsyncRAT BianLian Cobalt Strike DCRat Havoc Latrodectus PureLogs Stealer Quasar RAT Remcos Rhadamanthys Sliver ValleyRAT Venom RAT Vidar XWorm
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-11Reverse The MalwareDiyar Saadi
How Malware Survives: Understanding Watcher and Helper Components
2026-01-11Medium APOPHISMichelle Khalil
ValleyRAT_S2 Chinese campaign
ValleyRAT
2026-01-09The Hacker NewsRavie Lakshmanan
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations