Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-17NTT SecurityRintaro Koike, Ryu Hiyoshi
StoatWaffle, malware used by WaterPlum
StoatWaffle
2026-03-11MicrosoftMicrosoft Defender Experts, Microsoft Defender Security Research Team
Contagious Interview: Malware delivered through fake developer job interviews
BeaverTail OtterCookie StoatWaffle InvisibleFerret PylangGhost GolangGhost Contagious Interview
2026-03-09Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2
GolangGhost PylangGhost GolangGhost
2026-03-02MicrosoftMicrosoft Defender Security Research Team
OAuth redirection abuse enables phishing and malware delivery
2026-02-26GdataG DATA Security Lab
Free games with unexpected costs
HijackLoader
2026-02-25Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1
BeaverTail PylangGhost GolangGhost
2026-02-22Securite360.netMuffin
OPSEC on a Budget: What BadAudio Reveals About APT24
BADAUDIO
2026-02-19ElasticElastic Security Labs, Salim Bitam
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
AstarionRAT
2026-01-26KrebsOnSecurityBrian Krebs
Who Operates the Badbox 2.0 Botnet?
BADBOX Kimwolf Aisuru
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20KrebsOnSecurityBrian Krebs
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Kimwolf Aisuru
2026-01-19Swiss Post CybersecurityLouis Schürmann
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis
PureLogs Stealer
2026-01-13Security AllianceSecurity Alliance
VS Code Tasks Abuse by Contagious Interview (DPRK)
BeaverTail InvisibleFerret
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-08KrebsOnSecurityBrian Krebs
Who Benefited from the Aisuru and Kimwolf Botnets?
Kimwolf Aisuru
2026-01-06ResecurityResecurity
Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters'
2026-01-05SecurityWeekIonut Arghire
Kimwolf Android Botnet Grows Through Residential Proxy Networks
Kimwolf
2026-01-02KrebsOnSecurityBrian Krebs
The Kimwolf Botnet is Stalking Your Local Network
Kimwolf Aisuru
2026-01-02Securite360.netMuffin
The Intriguing Lotus: A Deep Dive into Sagerunex
Sagerunex
2025-12-30Koi SecurityGal Hachamov, Tuval Admoni
DarkSpectre: Unmasking the Threat Actor Behind 8.8 Million Infected Browsers
DarkSpectre ShadyPanda