Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-19AhnLabASEC
Proxyware Disguised as Notepad++ Tool
Larva‑25012
2026-01-19OpenSourceMalwarePaul McCarty
Contagious Interview gets an upgrade for 2026 - A comprehensive analysis by OpenSourceMalware
OtterCandy
2026-01-18malware source codesmelly
Smokest Stealer, a new malware family? Maybe?
Smokest Stealer
2026-01-16WithSecureMohammad Kazem Hassan Nejad
To the past and beyond: Andariel’s latest arsenal and cyberattacks
GopherRAT JelusRAT PetitPotato
2026-01-16sysdigSysdig Threat Research Team
VoidLink threat analysis: Sysdig discovers C2-compiled kernel rootkits
VoidLink
2026-01-15CyberArkAri Novick
UNO reverse card: stealing cookies from cookie stealers
Stealc
2026-01-15ANALYST1Anastasia Sentsova
Infrastructure in the Shadows: How Two Leaks Unmasked the Criminal Network of Yalishanda aka Media Land, and BlackBasta
Black Basta Black Basta
2026-01-15SansecSansec Forensics Team
Keylogger targets 200,000+ employees at major US bank
2026-01-15Cisco TalosAsheer Malhotra, Brandon White, Vitor Ventura
UAT-8837 targets critical infrastructure sectors in North America
Earthworm Rubeus SharpHound SharpWMI UAT-8837
2026-01-15ExpelAARON WALTON
Planned failure: Gootloader’s malformed ZIP actually works perfectly
GootLoader
2026-01-14Jamf BlogNir Avraham, Shen Yuan
Predator's kill switch: undocumented anti-analysis techniques in iOS spyware
Predator
2026-01-14R136a1Dominik Reichel
COMmand & Evade: Turla's Kazuar v3 Loader
Kazuar
2026-01-14Hunt.ioHunt.io
Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
2026-01-14TrellixMallikarjun Wali, Mohideen Abdul Khader
Hiding in Plain Sight: Deconstructing the Multi-Actor DLL Sideloading Campaign abusing ahost.exe
DCRat
2026-01-14S2W Inc.Byeongyeol An
Detailed Analysis of DragonForce Ransomware
DragonForce
2026-01-14MicrosoftMicrosoft Threat Intelligence
Inside RedVDS: How a single virtual desktop provider fueled worldwide cybercriminal operations
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-13InfobloxRenée Burton
Kimwolf Howls from Inside the Enterprise
Kimwolf Aisuru
2026-01-13LinkedIn (Majed Ali)Majed Ali
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX
ViperSoftX
2026-01-13Check Point ResearchCheck Point Research
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
VoidLink