Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-23ESET ResearchESET Research
ESET Research: Sandworm behind cyberattack on Poland’s power grid in late 2025
2026-01-23Zero DayKim Zetter
Cyberattack Targeting Poland’s Energy Grid Used a Wiper
2026-01-23Bluesky (@esetresearch.bsky.social)ESET Research
Post about DynoWiper activity
2026-01-23BlackPointJack Patrick, Sam Decker
Novel Fake CAPTCHA Chain Delivering Amatera Stealer
ACR Stealer Amatera
2026-01-23Medium Ireneusz TarnowskiIreneusz Tarnowski
SpyNote: Comprehensive Analysis of an Android Remote Access Trojan
SpyNote
2026-01-20JamfThijs Xhaflaire
Threat Actors Expand Abuse of Microsoft Visual Studio Code
StoatWaffle
2026-01-20Rostelecom-SolarPandora Hive Mind
ShadowRelay – a unique backdoor in the public sector
ShadowPad SNAPPYBEE
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20FalconFeedsFalconFeeds
Inside Iran’s APT Network: Profiling the Most Active Iranian State‑Linked Threat Actors
2026-01-19kmsecKieran Miyamoto
npm package bigmathix and the BigSquatRat campaign behind it
2026-01-16WithSecureMohammad Kazem Hassan Nejad
To the past and beyond: Andariel’s latest arsenal and cyberattacks
GopherRAT JelusRAT PetitPotato
2026-01-15ANALYST1Anastasia Sentsova
Infrastructure in the Shadows: How Two Leaks Unmasked the Criminal Network of Yalishanda aka Media Land, and BlackBasta
Black Basta Black Basta
2026-01-15ExpelAARON WALTON
Planned failure: Gootloader’s malformed ZIP actually works perfectly
GootLoader
2026-01-14Hunt.ioHunt.io
Inside China’s Hosting Ecosystem: 18,000+ Malware C2 Servers Mapped Across Major ISPs
2026-01-14TrellixMallikarjun Wali, Mohideen Abdul Khader
Hiding in Plain Sight: Deconstructing the Multi-Actor DLL Sideloading Campaign abusing ahost.exe
DCRat
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-13LinkedIn (Majed Ali)Majed Ali
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX
ViperSoftX
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-09flareAdrian Cheek
New Threat Actor Group PayTool Targets Canadians with Traffic Scams
PayTool