Click here to download all references as Bib-File.•
| 2026-02-05
⋅
Github (cocomelonc)
⋅
MacOS malware persistence 3: Dylib hijacking (VLC). Simple C example |
| 2026-02-05
⋅
Bleeping Computer
⋅
Italian university La Sapienza goes offline after cyberattack Rorschach Ransomware Femwar02 |
| 2026-02-04
⋅
Check Point Research
⋅
Amaranth-Dragon: Targeted Cyber Espionage Campaigns Across Southeast Asia Amaranth-Dragon |
| 2026-02-04
⋅
safebreach
⋅
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout Infy StormKittyRAT |
| 2026-02-03
⋅
Kaspersky Labs
⋅
The Notepad++ supply chain attack — unnoticed execution chains and new IoCs Chrysalis Cobalt Strike |
| 2026-02-02
⋅
Rapid7
⋅
The Chrysalis Backdoor: A Deep Dive into Lotus Blossom’s toolkit Chrysalis |
| 2026-02-01
⋅
⋅
Cert-UA
⋅
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542) GRUNT |
| 2026-01-31
⋅
Github (cocomelonc)
⋅
MacOS malware persistence 2: shell environment hijacking. Simple C example |
| 2026-01-30
⋅
Google
⋅
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft UNC6671 |
| 2026-01-29
⋅
Censys
⋅
AsyncRAT C2 Activity at Internet Scale AsyncRAT |
| 2026-01-29
⋅
Sekoia
⋅
Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic IClickFix |
| 2026-01-29
⋅
HarfangLab
⋅
RedKitten: AI-accelerated campaign targeting Iranian protests SloppyMIO RedKitten |
| 2026-01-28
⋅
Accenture
⋅
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool RustyRocket |
| 2026-01-28
⋅
Proofpoint
⋅
Can’t stop, won’t stop: TA584 innovates initial access XWorm TA584 |
| 2026-01-28
⋅
Google
⋅
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network |
| 2026-01-28
⋅
Hunt.io
⋅
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS |
| 2026-01-28
⋅
ESET Research
⋅
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan GhostChat |
| 2026-01-27
⋅
Zscaler
⋅
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2 MAILCREEP SHEETCREEP |
| 2026-01-27
⋅
Google
⋅
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 |
| 2026-01-26
⋅
Zscaler
⋅
Malicious NPM Packages Deliver NodeCordRAT NodeCordRAT |