Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-19GitLabOliver Smith
GitLab Threat Intelligence Team reveals North Korean tradecraft
BeaverTail OtterCookie
2026-02-17Hunt.ioHunt.io
Fake Homebrew Typosquats Used to Deliver Cuckoo Stealer via ClickFix
2026-02-17GoogleDaniel Sislo, Fernando Tomlinson, John Scarbrough, Jr., Nick Harbour, PETER UKHANOV, Rich Reece
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
BRICKSTORM GRIMBOLT SLAYSTYLE UNC6201
2026-02-17CERT.PLCERT.PL
ClickFix in action: how a fake captcha can encrypt an entire company
Latrodectus Supper
2026-02-17ANY.RUNANY.RUN
LATAM Businesses Hit by XWorm via Fake Financial Receipts: Full Campaign Analysis
XWorm
2026-02-16kmsecKieran Miyamoto
Exposed DPRK reference malware and logs
2026-02-16Huntress LabsAnna Pham, Michael Tigges
ClickFix Won't Die. Neither Will Matanbuchus. A New RAT and a Hands-on-Keyboard Intrusion
AstarionRAT Matanbuchus
2026-02-15Github (jrm360seclab)Johny Metellus
AODIN X1BQ Projector — Pre-Installed Vo1d Botnet Malware
Void
2026-02-13kmsecKieran Miyamoto
VMWare artifacts left by a FAMOUS CHOLLIMA operator
2026-02-12BotcrawlSean Doyle
Nippon Medical School Musashi Kosugi Hospital Data Breach Claimed by NetRunnerPR
NetRunnerPR
2026-02-12SekoiaPierre Le Bourhis
OysterLoader Unmasked: The Multi-Stage Evasion Loader
Broomstick
2026-02-12LevelBlueRodel Mendrez
How ClickFix Opens the Door to Stealthy StealC Information Stealer
IClickFix Stealc
2026-02-11IsovalentJeremy Colvin
Deconstructing Voidlink: Why New AI and Cloud-Native Threats Require a New Class of Defense
VoidLink UAT-9921
2026-02-11BitdefenderBogdan Ionut Lazar, Janos Gergo Szeles, Manuel Dragomir
LummaStealer Is Getting a Second Life Alongside CastleLoader
CASTLELOADER Lumma Stealer
2026-02-10Cisco TalosAaron Boyd, Asheer Malhotra, Nick Biasini, Vitor Ventura
New threat actor, UAT-9921, leverages VoidLink framework in campaigns
VoidLink UAT-9921
2026-02-09MandiantAdrian Hernandez, Ross Inman
UNC1069 Targets Cryptocurrency Sector with New Tooling and AI-Enabled Social Engineering
SUGARLOADER WAVESHAPER
2026-02-09TRUESECAndreas Törnqvist, Mattias Wåhlén, Nicklas Keijser
Detecting Russian Threats to Critical Energy Infrastructure
DynoWiper
2026-02-06t0ast's blogt0ast
DynoWiper: From Russia with Love
DynoWiper
2026-02-05SymantecThreat Hunter Team
Reynolds: Defense Evasion Capability Embedded in Ransomware Payload
Reynolds
2026-02-05Github (cocomelonc)cocomelonc
MacOS malware persistence 3: Dylib hijacking (VLC). Simple C example