Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-04-08Black Lotus LabsDanny Adamitis, Ryan English
FrostArmada: All thriller, no (malware) filler
2026-04-07MicrosoftMicrosoft Threat Intelligence
SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
2026-04-07IC3CISA, CNMF, Department of Energy (DOE), EPA, FBI, NSA
AA26-097A: Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure
2026-04-07NCSC UKNCSC UK
APT28 exploit routers to enable DNS hijacking operations
2026-04-01cocomelonccocomelonc
MacOS hacking part 13: sysinfo stealer via VirusTotal API. Simple C example
2026-03-31GoogleAdrian Hernandez, Ashley Zaya, Austin Larsen, Christopher Gardner, Dima Lenz, Michael Rudden, Mon Liclican, Tyler McLellan
North Korea-Nexus Threat Actor Compromises Widely Used Axios NPM Package in Supply Chain Attack
WAVESHAPER
2026-03-29cocomelonccocomelonc
MacOS malware persistence 7: Re-opened applications. Simple C example
2026-03-26ANY.RUNkhr0x, raptur3
Active Magecart Campaign Targets Spain, Steals Card Data via Hijacked eStores for Bank Fraud
magecart
2026-03-26Rapid7Rapid7
BPFdoor in Telecom Networks: Sleeper Cells in the Backbone
BPFDoor tsh
2026-03-25ANY.RUNAchmad Adhikara, GridGuardGhoul
Kamasers Analysis: A Multi-Vector DDoS Botnet Targeting Organizations Worldwide
Kamasers
2026-03-23NetomizeMohamad Mokbel
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient
2026-03-20IC3FBI, IC3
I-032026-PSA: Russian Intelligence Services Target Commercial Messaging Application Accounts
2026-03-20FBIFBI
Government of Iran Cyber Actors Deploy Telegram C2 to Push Malware to Identified Targets
2026-03-20cocomelonccocomelonc
MacOS malware persistence 6: PAM module injection. Simple C example
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-03-19cocomelonccocomelonc
MacOS malware persistence 5: cron jobs. Simple C example
2026-03-18GoogleGoogle Threat Intelligence Group
The Proliferation of DarkSword: iOS Exploit Chain Adopted by Multiple Threat Actors
GHOSTBLADE
2026-03-17Hunt.ioHunt.io
Iranian Botnet Exposed via Open Directory: 15-Node Relay Network and Active C2
2026-03-16Ransom-ISACFrançois-Julien Alcaraz, Yashraj Solanki
Contagious Interview: VS Code to RAT
StoatWaffle
2026-03-12GdataJohn Dador
Endgame Harvesting: Inside ACRStealer’s Modern Infrastructure
ACR Stealer