Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-07RedPacket SecurityRedPacket Security
[KRYBIT] – Ransomware Victim: fraper[.]com
Krybit
2026-04-07MicrosoftMicrosoft Threat Intelligence
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
2026-04-07IC3CISA, CNMF, Department of Energy (DOE), EPA, FBI, NSA
AA26-097A: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
2026-04-07NCSC UKNCSC UK
APT28 exploit routers to enable DNS hijacking operations
2026-04-07Gen DigitalJan Rubín, Vojtěch Krejsa
Remus: Unmasking The 64-bit Variant of the Infamous Lumma Stealer
Lumma Stealer Remus Tenzor
2026-04-06PICUS SecurityUmut Bayram
How NoName057(16) Uses DDoSia to Attack NATO Targets
Z-Pentest Alliance
2026-04-050x3oBADAbdullah Islam
Deep Technical Analysis Of Payload Ransomware Targeting ESXi Environment
Payload
2026-04-03PantherMichael Baker
jsonspack: Multi-Tenant Node.js RAT — DPRK Supply Chain Campaign
OtterCookie
2026-04-03Trend MicroJacob Santos, Jeffrey Francis Bonaobra, Sophia Nilette Robles
Weaponizing Trust Signals: Claude Code Lures and GitHub Release Payloads
GhostSocks Vidar
2026-04-02cocomelonccocomelonc
MacOS malware persistence 8: periodic scripts. Simple C example
2026-04-02tracebitAlessandro Brucato
Detecting CI/CD Supply Chain Attacks with Canary Credentials
TeamPCP
2026-04-02Cisco TalosAsheer Malhotra, Brandon White
UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
UAT-10608
2026-04-02ElasticRemco Sprooten, Ruben Groenewoud
Hooked on Linux: Rootkit Detection Engineering
2026-04-01SOC PrimeDaryna Olyniychuk
UAC-0255 Attack Detection: Threat Actors Impersonate CERT-UA to Infect Ukrainian Public and Private Sector Organizations With AGEWHEEZE RAT
AGEWHEEZE Cyber Serp
2026-04-01ZscalarAvinash Kumar, Jithin Prajeev Nair, Mallikarjun Piddannavar, Manisha Ramcharan Prajapati
Anthropic Claude Code Leak
GhostSocks Vidar
2026-04-01cocomelonccocomelonc
MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example
2026-03-31BitSightBitSight
Ransomware with a Twizt: Inside the Phorpiex Botnet
LockBit Phorpiex
2026-03-31GoogleAdrian Hernandez, Ashley Zaya, Austin Larsen, Christopher Gardner, Dima Lenz, Michael Rudden, Mon Liclican, Tyler McLellan
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
WAVESHAPER
2026-03-30CERT.PLCERT.PL
FvncBot Campaign Analysis
SpyFRPTunnel
2026-03-30Trend MicroJohn Rainier Navato
TeamPCP’s Telnyx Attack Marks a Shift in Tactics Beyond LiteLLM
TeamPCP