Click here to download all references as Bib-File.•
| 2026-01-19
⋅
AhnLab
⋅
Proxyware Disguised as Notepad++ Tool Larva‑25012 |
| 2026-01-19
⋅
OpenSourceMalware
⋅
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware OtterCandy |
| 2026-01-18
⋅
malware source code
⋅
Smokest Stealer, a new malware family? Maybe? Smokest Stealer |
| 2026-01-16
⋅
WithSecure
⋅
To the past and beyond: Andariel’s latest arsenal and cyberattacks GopherRAT JelusRAT PetitPotato |
| 2026-01-16
⋅
sysdig
⋅
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits VoidLink |
| 2026-01-15
⋅
CyberArk
⋅
UNO reverse card: stealing cookies from cookie stealers Stealc |
| 2026-01-15
⋅
ANALYST1
⋅
Infrastructure in the Shadows: How Two Leaks Unmasked the Criminal Network of Yalishanda aka Media Land, and BlackBasta Black Basta Black Basta |
| 2026-01-15
⋅
Sansec
⋅
Keylogger targets 200,000+ employees at major US bank |
| 2026-01-15
⋅
Cisco Talos
⋅
UAT-8837 targets critical infrastructure sectors in North America Earthworm Rubeus SharpHound SharpWMI UAT-8837 |
| 2026-01-15
⋅
Expel
⋅
Planned failure: Gootloader’s malformed ZIP actually works perfectly GootLoader |
| 2026-01-14
⋅
Jamf Blog
⋅
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware Predator |
| 2026-01-14
⋅
R136a1
⋅
COMmand & Evade: Turla's Kazuar v3 Loader Kazuar |
| 2026-01-14
⋅
Hunt.io
⋅
Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs |
| 2026-01-14
⋅
Trellix
⋅
Hiding in Plain Sight: Deconstructing the Multi-Actor DLL Sideloading Campaign abusing ahost.exe DCRat |
| 2026-01-14
⋅
S2W Inc.
⋅
Detailed Analysis of DragonForce Ransomware DragonForce |
| 2026-01-14
⋅
Microsoft
⋅
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations |
| 2026-01-13
⋅
Medium @0xOZ
⋅
How to Get Scammed (by DPRK Hackers) JADESNOW |
| 2026-01-13
⋅
Infoblox
⋅
Kimwolf Howls from Inside the Enterprise Kimwolf Aisuru |
| 2026-01-13
⋅
LinkedIn (Majed Ali)
⋅
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX ViperSoftX |
| 2026-01-13
⋅
Check Point Research
⋅
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework VoidLink |