Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-05Bleeping ComputerBill Toulas
Italian university La Sapienza goes offline after cyberattack
Rorschach Ransomware Femwar02
2026-02-05SymantecThreat Hunter Team
Black Basta: Defense Evasion Capability Embedded in Ransomware Payload
Black Basta
2026-02-04TrellixAlex Lanstein, Pham Duy Phuc
APT28’s Stealthy Multi-Stage Campaign Leveraging CVE‑2026‑21509 and Cloud C2 Infrastructure
GONEPOSTAL GRUNT
2026-02-04StrikeReadyAlex Lanstein, Pham Duy Phuc
APT28’s Stealthy Multi-Stage Campaign Leveraging CVE‑2026‑21509 and Cloud C2 Infrastructure
GONEPOSTAL GRUNT
2026-02-04Check Point ResearchCheck Point Research
Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia
Amaranth-Dragon
2026-02-04safebreachTomer Bar
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout
Infy StormKittyRAT
2026-02-03LevelBlueEvgeny Ananin, Mark Tsipershtein
The Godfather of Ransomware? Inside DragonForce’s Cartel Ambitions
DragonForce
2026-02-03Kaspersky LabsAnton Kargin, Georgy Kucherin
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Chrysalis Cobalt Strike
2026-02-02Rapid7Ivan Feigl
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Chrysalis
2026-02-02NetresecErik Hjelmvik
njRAT runs MassLogger
MASS Logger NjRAT
2026-02-01Midnight Blue LabsMidnight Blue
Have you tried turning it off and on again? On bricking OT devices (part 2)
2026-02-01Midnight Blue LabsMidnight Blue
Have you tried turning it off and on again? On bricking OT devices (part 1)
2026-02-01splintersfuryAhmad Abdillah Bin Zaini
KernelSight: Windows Kernel Driver Exploitation Knowledge Base
BlackByte FudModule Nokoyawa Ransomware
2026-02-01Cert-UACert-UA
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542)
GRUNT
2026-01-30GoogleMandiant
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
UNC6671
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper
2026-01-30LevelBlueEvgeny Ananin, Mark Tsipershtein, Nikita Kazymirskyi
19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware: Part 1
LockBit LockBit
2026-01-30abuse.chabuse.ch
X posting from abuse.ch on Xillen Stealer
Xillen Stealer
2026-01-30CERT.PLCERT.PL
Energy Sector Incident Report – 29 December
LazyWiper DynoWiper
2026-01-29Cisco TalosJoey Chen
Dissecting UAT-8099: New persistence mechanisms and regional focus
UAT-8099