Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-29CensysAndrew Northern
AsyncRAT C2 Activity at Internet Scale
AsyncRAT
2026-01-29SekoiaAmaury G., Quentin Bourgue, Sekoia TDR
Meet IClickFix: a widespread WordPress-targeting framework using the ClickFix tactic
IClickFix
2026-01-29FortninetAngelo Deveraturda, Jared Betts, John Simmons, Ken Evans, Mark Robson, Omar Avilez Melo, Xiaopeng Zhang
Interlock Ransomware: New Techniques, Same Old Tricks
Interlock
2026-01-29CrowdStrikeCrowdStrike Threat Intel Team, Rob Bruner
LABYRINTH CHOLLIMA Evolves into Three Adversaries
2026-01-29HarfangLabHarfangLab CTR
RedKitten: AI-accelerated campaign targeting Iranian protests
SloppyMIO RedKitten
2026-01-28Natto ThoughtsEugenio Benincasa
Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations
2026-01-28ProofpointProofpoint Threat Research Team
Can’t stop, won’t stop: TA584 innovates initial access
XWorm TA584
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-28Hunt.ioHunt.io
Exposed Open Directory Leaks a Full BYOB Deployment Across Windows, Linux, and macOS
2026-01-28ESET ResearchLukáš Štefanko
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
GhostChat
2026-01-28FortinetVincent Li
Unveiling the Weaponized Web Shell EncystPHP
INJ3CTOR3
2026-01-27ZscalerSudeep Singh, Yin Hong Chang
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2
MAILCREEP SHEETCREEP
2026-01-27GoogleGoogle Threat Intelligence Group
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
2026-01-26ZscalerLAKHAN PARASHAR, Satyam Singh
Malicious NPM Packages Deliver NodeCordRAT
NodeCordRAT
2026-01-26CodeCrankDaniel Tofan
A LinkedIn Job Offer Tried to Install Malware on My Machine
2026-01-26Trend MicroJoseph C Chen, Ted Lee
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
PeckBirdy GRAYRABBIT
2026-01-26KrebsOnSecurityBrian Krebs
Who Operates the Badbox 2.0 Botnet?
BADBOX Kimwolf Aisuru
2026-01-26ZscalerSudeep Singh, Yin Hong Chang
APT Attacks Target Indian Government Using GOGITTER, GITSHELLPAD, and GOSHELL | Part 1
Cobalt Strike
2026-01-23ESET ResearchESET Research
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
2026-01-23Zero DayKim Zetter
Cyberattack Targeting Poland’s Energy Grid Used a Wiper