Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-05Github (cocomelonc)cocomelonc
MacOS malware persistence 3: Dylib hijacking (VLC). Simple C example
2026-02-05Bleeping ComputerBill Toulas
Italian university La Sapienza goes offline after cyberattack
Rorschach Ransomware Femwar02
2026-02-04Check Point ResearchCheck Point Research
Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia
Amaranth-Dragon
2026-02-04safebreachTomer Bar
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout
Infy StormKittyRAT
2026-02-03Kaspersky LabsAnton Kargin, Georgy Kucherin
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs
Chrysalis Cobalt Strike
2026-02-02Rapid7Ivan Feigl
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit
Chrysalis
2026-02-01Cert-UACert-UA
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542)
GRUNT
2026-01-31Github (cocomelonc)cocomelonc
MacOS malware persistence 2: shell environment hijacking. Simple C example
2026-01-30GoogleMandiant
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
UNC6671
2026-01-29CensysAndrew Northern
AsyncRAT C2 Activity at Internet Scale
AsyncRAT
2026-01-29SekoiaAmaury G., Quentin Bourgue, Sekoia TDR
Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic
IClickFix
2026-01-29HarfangLabHarfangLab CTR
RedKitten: AI-accelerated campaign targeting Iranian protests
SloppyMIO RedKitten
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-28ProofpointProofpoint Threat Research Team
Can’t stop, won’t stop: TA584 innovates initial access
XWorm TA584
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-28Hunt.ioHunt.io
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS
2026-01-28ESET ResearchLukáš Štefanko
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
GhostChat
2026-01-27ZscalerSudeep Singh, Yin Hong Chang
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2
MAILCREEP SHEETCREEP
2026-01-27GoogleGoogle Threat Intelligence Group
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
2026-01-26ZscalerLAKHAN PARASHAR, Satyam Singh
Malicious NPM Packages Deliver NodeCordRAT
NodeCordRAT