Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-16Ctrl-Alt-IntelCtrl-Alt-Intel
FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops
2026-03-13Scarlet Shark
Analyst’s Brief: Moonrise RAT
MoonRise
2026-03-13kmsecKieran Miyamoto
First instance of PylangGhost RAT observed on npm
PylangGhost
2026-03-12GdataJohn Dador
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
ACR Stealer
2026-03-12Check Point ResearchCheckpoint Research
“Handala Hack” – Unveiling Group’s Modus Operandi
2026-03-11MicrosoftMicrosoft Defender Experts, Microsoft Defender Security Research Team
Contagious Interview: Malware delivered through fake developer job interviews
BeaverTail OtterCookie StoatWaffle InvisibleFerret PylangGhost GolangGhost Contagious Interview
2026-03-11Hunt.ioHunt.io
Operation Roundish: Uncovering an APT28 Roundcube Toolkit Used Against Ukrainian Government Targets
2026-03-10AhnLabASEC
Analysis of the Green Blood v2.0 ransomware, which is decryptable
GreenBlood
2026-03-10ZenoX, ZenoX
VENON: The First Brazilian Banker RAT in Rust
VENON
2026-03-10Check Point ResearchCheck Point Research
Iranian MOIS Actors & the Cyber Crime Connection
Qilin Tsundere CASTLELOADER Rhadamanthys
2026-03-10LumenBlack Lotus Labs
Silence of the hops: The KadNap botnet
KadNap
2026-03-10ESET ResearchESET Research
Sednit reloaded: Back in the trenches
BEARDSHELL GRUNT SLIMAGENT X-Agent XTunnel
2026-03-09Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2
GolangGhost PylangGhost GolangGhost
2026-03-07OpenSourceMalwareOpenSourceMalware
PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos
JADESNOW
2026-03-06MicrosoftMicrosoft Threat Intelligence
AI as tradecraft: How threat actors operationalize AI
OtterCookie
2026-03-05ElasticRemco Sprooten, Ruben Groenewoud
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft
2026-03-05SymantecThreat Hunter Team
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company
Tsundere
2026-03-05eSentireeSentire Threat Response Unit (TRU)
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')
JADESNOW
2026-03-05Github (cocomelonc)cocomelonc
Malware and cryptography 44 - encrypt/decrypt payload via Discrete Fourier Transform. Simple C example.
2026-03-04Huntress LabsJai Minton, Ryan Dowd
"Malware, from the Outside!": How a Threat Actor Used Fake OpenClaw Installers to Infect Systems with GhostSocks and Information Stealers
GhostSocks Vidar