Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-10ZenoX, ZenoX
VENON: The First Brazilian Banker RAT in Rust
VENON
2026-03-10Check Point ResearchCheck Point Research
Iranian MOIS Actors & the Cyber Crime Connection
Qilin Tsundere CASTLELOADER Rhadamanthys
2026-03-10LumenBlack Lotus Labs
Silence of the hops: The KadNap botnet
KadNap
2026-03-10ESET ResearchESET Research
Sednit reloaded: Back in the trenches
BEARDSHELL GRUNT SLIMAGENT X-Agent XTunnel
2026-03-09Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2
GolangGhost PylangGhost GolangGhost
2026-03-07OpenSourceMalwareOpenSourceMalware
PolinRider: DPRK Threat Actor Implants Malware in Hundreds of GitHub Repos
JADESNOW
2026-03-06MicrosoftMicrosoft Threat Intelligence
AI as tradecraft: How threat actors operationalize AI
OtterCookie
2026-03-05ElasticRemco Sprooten, Ruben Groenewoud
Hooked on Linux: Rootkit Taxonomy, Hooking Techniques and Tradecraft
2026-03-05SymantecThreat Hunter Team
Seedworm: Iranian APT on Networks of U.S. Bank, Airport, Software Company
Tsundere
2026-03-05eSentireeSentire Threat Response Unit (TRU)
North Korean APT Malware Analysis: DEV#POPPER RAT and OmniStealer (Everyday I'm Shufflin')
JADESNOW
2026-03-05Github (cocomelonc)cocomelonc
Malware and cryptography 44 - encrypt/decrypt payload via Discrete Fourier Transform. Simple C example.
2026-03-04Huntress LabsJai Minton, Ryan Dowd
"Malware, from the Outside!": How a Threat Actor Used Fake OpenClaw Installers to Infect Systems with GhostSocks and Information Stealers
GhostSocks Vidar
2026-03-04Hunt.ioHunt.io
Iranian APT Infrastructure in Focus: Mapping State-Aligned Clusters During Geopolitical Escalation
2026-03-04Ctrl-Alt-IntelCtrl-Alt-Intel
MuddyWater Exposed: Inside an Iranian APT operation
Tsundere
2026-03-04EG-FinCirtEG-FinCirt Malware Analysis team
Remcos RAT Operations: How Attackers Gain and Maintain Control
Remcos
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna
2026-03-03GoogleGoogle Threat Intelligence Group
Coruna: The Mysterious Journey of a Powerful iOS Exploit Kit
Coruna UNC6353 UNC6691
2026-03-03MicrosoftMicrosoft
Signed malware impersonating workplace apps deploys RMM backdoors
TrustConnect RAT
2026-03-02MoonlockMoonlock Lab Team
Fake VCs target crypto talent in a new ClickFix campaign
AmodalTea
2026-03-02ZscalerSudeep Singh
Dust Specter APT Targets Government Officials in Iraq