Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-01-13Medium @0xOZOZ
How to Get Scammed (by DPRK Hackers)
JADESNOW
2026-01-13InfobloxRenée Burton
Kimwolf Howls from Inside the Enterprise
Kimwolf Aisuru
2026-01-13LinkedIn (Majed Ali)Majed Ali
Dissecting a Multi-Stage Malware Campaign: How Cracked Software's Delivers ViperSoftX
ViperSoftX
2026-01-13Check Point ResearchCheck Point Research
Unveiling VoidLink – A Stealthy, Cloud-Native Linux Malware Framework
VoidLink
2026-01-13Security AllianceSecurity Alliance
VS Code Tasks Abuse by Contagious Interview (DPRK)
BeaverTail InvisibleFerret
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-12PolySwarm Tech TeamThe Hivemind
Transparent Tribe Evolves Tradecraft With Multi-Stage LNK Malware
2026-01-12SecuronixAaron Beardslee, Akshay Gaikwad, Shikha Sangwan
SHADOW#REACTOR – Text-Only Staging, .NET Reactor, and In-Memory Remcos RAT Deployment
Remcos
2026-01-12Cert-UACert-UA
"Unreliable Fund": targeted cyberattacks UAC-0190 against SOU using PLUGGYAPE (CERT-UA#19092)
PLUGGYAPE Void Blizzard
2026-01-11Medium APOPHISMichelle Khalil
ValleyRAT_S2 Chinese campaign
ValleyRAT
2026-01-09flareAdrian Cheek
New Threat Actor Group PayTool Targets Canadians with Traffic Scams
PayTool
2026-01-09The Hacker NewsRavie Lakshmanan
Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations
2026-01-09DARKReadingNate Nelson
Russia’s Fancy Bear APT Doubles Down on Global Secrets Theft
2026-01-08CloudseksomedieyoungZZ
Reborn in Rust: Muddy Water Evolves Tooling with RustyWater Implant
Archer RAT
2026-01-08FBIIC3
North Korean Kimsuky Actors Leverage Malicious QR Codes in Spearphishing Campaigns Targeting U.S. Entities
2026-01-08KrebsOnSecurityBrian Krebs
Who Benefited from the Aisuru and Kimwolf Botnets?
Kimwolf Aisuru
2026-01-07MalBeaconMalBeacon
[Op Report] CastleRAT Campaign leads to Hands-on-Keyboard ATO Operations
NightshadeC2
2026-01-07Recorded FutureInsikt Group
GRU-Linked BlueDelta Evolves Credential Harvesting
2026-01-06Reversing LabsRobert Simmons
Unpacking the packer ‘pkr_mtsi’
Broomstick Supper
2026-01-06TrellixAswath A
The Ghost in the Machine: Unmasking CrazyHunter's Stealth Tactics
CrazyHunter