Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-26SOCRadarSOCRadar
Telegram Hacktivist Activity Timeline of Iran – Israel & US War
313 Team Conquerors Electronic Army Cyber Islamic Resistance Keymous+ Z-Pentest Alliance
2026-03-26The RecordDaryna Antoniuk
Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware
Babuk LockBit Bearlyfy
2026-03-26Trend MicroAshish Verma, Deep Patel, Fernando Tucci, John Rainier Navato, Peter Girnus, Simon Dulude
Your AI Gateway Was a Backdoor: Inside the LiteLLM Supply Chain Compromise
TeamPCP
2026-03-26DarktraceIsabel Evans
Phantom Footprints: Tracking GhostSocks Malware
GhostSocks Lumma Stealer
2026-03-26ANY.RUNkhr0x, raptur3
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
magecart
2026-03-26Rapid7Rapid7
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
BPFDoor tsh
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-24ZynapAlberto Marín
Defensive Rootkits: Engineering Kernel-Level Malware Analysis from Ring 0
Xloader CloudEyE Lumma Stealer SmokeLoader
2026-03-23NetskopeVini Egerland
OpenClaw Trap: AI-Assisted Lure Factory Targets Developers & Gamers
2026-03-23NetomizeMohamad Mokbel
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient
2026-03-23SophosSophos Counter Threat Unit Research Team
NICKEL ALLEY strategy: Fake it ‘til you make it
PylangGhost GolangGhost Nickel Alley
2026-03-20AhnLabASEC
Attack Targeting MS‑SQL Servers to Deploy the ICE Cloud Scanner (Larva-26002)
Larva-26002
2026-03-20IC3FBI, IC3
I-032026-PSA: Russian Intelligence Services Target Commercial Messaging Application Accounts
2026-03-20FBIFBI
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
2026-03-20cocomelonccocomelonc
MacOS malware persistence 6: PAM module injection. Simple C example
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-19cocomelonccocomelonc
MacOS malware persistence 5: cron jobs. Simple C example
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-18ZscalerMuhammed Irfan V A
Technical analysis of SnappyClient
HijackLoader SnappyClient
2026-03-17SeqriteSathwik Ram Prakki
Operation GhostMail: Russian APT exploits Zimbra Webmail to Target Ukraine State Agency
Unidentified JS 007 (Zimbra Stealer)