Click here to download all references as Bib-File.•
| 2026-03-16
⋅
Ctrl-Alt-Intel
⋅
FancyBear Exposed: Major OPSEC Blunder Inside Russian Espionage Ops |
| 2026-03-13
⋅
Analyst’s Brief: Moonrise RAT MoonRise |
| 2026-03-13
⋅
kmsec
⋅
First instance of PylangGhost RAT observed on npm PylangGhost |
| 2026-03-12
⋅
Gdata
⋅
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure ACR Stealer |
| 2026-03-12
⋅
Check Point Research
⋅
“Handala Hack” – Unveiling Group’s Modus Operandi |
| 2026-03-11
⋅
Microsoft
⋅
Contagious Interview: Malware delivered through fake developer job interviews BeaverTail OtterCookie StoatWaffle InvisibleFerret PylangGhost GolangGhost Contagious Interview |
| 2026-03-11
⋅
Hunt.io
⋅
Operation Roundish: Uncovering an APT28 Roundcube Toolkit Used Against Ukrainian Government Targets |
| 2026-03-10
⋅
⋅
AhnLab
⋅
Analysis of the Green Blood v2.0 ransomware, which is decryptable GreenBlood |
| 2026-03-10
⋅
ZenoX
⋅
VENON: The First Brazilian Banker RAT in Rust VENON |
| 2026-03-10
⋅
Check Point Research
⋅
Iranian MOIS Actors & the Cyber Crime Connection Qilin Tsundere CASTLELOADER Rhadamanthys |
| 2026-03-10
⋅
Lumen
⋅
Silence of the hops: The KadNap botnet KadNap |
| 2026-03-10
⋅
ESET Research
⋅
Sednit reloaded: Back in the trenches BEARDSHELL GRUNT SLIMAGENT X-Agent XTunnel |
| 2026-03-09
⋅
Abstract Security
⋅
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2 GolangGhost PylangGhost GolangGhost |
| 2026-03-07
⋅
OpenSourceMalware
⋅
PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos JADESNOW |
| 2026-03-06
⋅
Microsoft
⋅
AI as tradecraft: How threat actors operationalize AI OtterCookie |
| 2026-03-05
⋅
Elastic
⋅
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft |
| 2026-03-05
⋅
Symantec
⋅
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company Tsundere |
| 2026-03-05
⋅
eSentire
⋅
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin') JADESNOW |
| 2026-03-05
⋅
Github (cocomelonc)
⋅
Malware and cryptography 44 - encrypt/decrypt payload via Discrete Fourier Transform. Simple C example. |
| 2026-03-04
⋅
Huntress Labs
⋅
"Malware, from the Outside!": How a Threat Actor Used Fake OpenClaw Installers to Infect Systems with GhostSocks and Information Stealers GhostSocks Vidar |