Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-02-01splintersfuryAhmad Abdillah Bin Zaini
KernelSight: Windows Kernel Driver Exploitation Knowledge Base
BlackByte FudModule Nokoyawa Ransomware
2026-02-01Cert-UACert-UA
"Danger Bulletin": UAC-0001 (APT28) carries out cyberattacks against Ukraine and EU countries using the CVE-2026-21509 exploit (CERT-UA#19542)
GRUNT
2026-01-30GoogleMandiant
Vishing for Access: Tracking the Expansion of ShinyHunters-Branded SaaS Data Theft
UNC6671
2026-01-30ESET ResearchESET Research
DynoWiper update: Technical analysis and attribution
DynoWiper
2026-01-30LevelBlueEvgeny Ananin, Mark Tsipershtein, Nikita Kazymirskyi
19 Shades of LockBit5.0, Inside the Latest Cross-Platform Ransomware: Part 1
LockBit LockBit
2026-01-29Cisco TalosJoey Chen
Dissecting UAT-8099: New persistence mechanisms and regional focus
UAT-8099
2026-01-29CensysAndrew Northern
AsyncRAT C2 Activity at Internet Scale
AsyncRAT
2026-01-29FortninetAngelo Deveraturda, Jared Betts, John Simmons, Ken Evans, Mark Robson, Omar Avilez Melo, Xiaopeng Zhang
Interlock Ransomware: New Techniques, Same Old Tricks
Interlock
2026-01-29CrowdStrikeCrowdStrike Threat Intel Team, Rob Bruner
LABYRINTH CHOLLIMA Evolves into Three Adversaries
2026-01-29HarfangLabHarfangLab CTR
RedKitten: AI-accelerated campaign targeting Iranian protests
SloppyMIO RedKitten
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-28Natto ThoughtsEugenio Benincasa
Provincial Tasking, Cross-Provincial Execution: A Case-Based Look at How China Scales Cyber Operations
2026-01-28ProofpointProofpoint Threat Research Team
Can’t stop, won’t stop: TA584 innovates initial access
XWorm TA584
2026-01-28GoogleGoogle Threat Intelligence Group
No Place Like Home Network: Disrupting the World's Largest Residential Proxy Network
2026-01-28ESET ResearchLukáš Štefanko
Love? Actually: Fake dating app used as lure in targeted spyware campaign in Pakistan
GhostChat
2026-01-27ZscalerSudeep Singh, Yin Hong Chang
APT Attacks Target Indian Government Using SHEETCREEP, FIREPOWER, and MAILCREEP | Part 2
MAILCREEP SHEETCREEP
2026-01-27GoogleGoogle Threat Intelligence Group
Diverse Threat Actors Exploiting Critical WinRAR Vulnerability CVE-2025-8088
2026-01-26ZscalerLAKHAN PARASHAR, Satyam Singh
Malicious NPM Packages Deliver NodeCordRAT
NodeCordRAT
2026-01-26Trend MicroJoseph C Chen, Ted Lee
PeckBirdy: A Versatile Script Framework for LOLBins Exploitation Used by China-aligned Threat Groups
PeckBirdy GRAYRABBIT
2026-01-26KrebsOnSecurityBrian Krebs
Who Operates the Badbox 2.0 Botnet?
BADBOX Kimwolf Aisuru