Click here to download all references as Bib-File.•
| 2026-02-01
⋅
splintersfury
⋅
KernelSight: Windows Kernel Driver Exploitation Knowledge Base BlackByte FudModule Nokoyawa Ransomware |
| 2026-02-01
⋅
⋅
Cert-UA
⋅
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542) GRUNT |
| 2026-01-30
⋅
Google
⋅
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft UNC6671 |
| 2026-01-30
⋅
ESET Research
⋅
DynoWiper update: Technical analysis and attribution DynoWiper |
| 2026-01-30
⋅
LevelBlue
⋅
19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware: Part 1 LockBit LockBit |
| 2026-01-29
⋅
Cisco Talos
⋅
Dissecting UAT-8099: New persistence mechanisms and regional focus UAT-8099 |
| 2026-01-29
⋅
Censys
⋅
AsyncRAT C2 Activity at Internet Scale AsyncRAT |
| 2026-01-29
⋅
Fortninet
⋅
Interlock Ransomware: New Techniques, Same Old Tricks Interlock |
| 2026-01-29
⋅
CrowdStrike
⋅
LABYRINTH CHOLLIMA Evolves into Three Adversaries |
| 2026-01-29
⋅
HarfangLab
⋅
RedKitten: AI-accelerated campaign targeting Iranian protests SloppyMIO RedKitten |
| 2026-01-28
⋅
Accenture
⋅
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool RustyRocket |
| 2026-01-28
⋅
Natto Thoughts
⋅
Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations |
| 2026-01-28
⋅
Proofpoint
⋅
Can’t stop, won’t stop: TA584 innovates initial access XWorm TA584 |
| 2026-01-28
⋅
Google
⋅
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network |
| 2026-01-28
⋅
ESET Research
⋅
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan GhostChat |
| 2026-01-27
⋅
Zscaler
⋅
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2 MAILCREEP SHEETCREEP |
| 2026-01-27
⋅
Google
⋅
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088 |
| 2026-01-26
⋅
Zscaler
⋅
Malicious NPM Packages Deliver NodeCordRAT NodeCordRAT |
| 2026-01-26
⋅
Trend Micro
⋅
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups PeckBirdy GRAYRABBIT |
| 2026-01-26
⋅
KrebsOnSecurity
⋅
Who Operates the Badbox 2.0 Botnet? BADBOX Kimwolf Aisuru |