Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-03-17NTT SecurityRintaro Koike, Ryu Hiyoshi
StoatWaffle, malware used by WaterPlum
StoatWaffle
2026-03-11MicrosoftMicrosoft Defender Experts, Microsoft Defender Security Research Team
Contagious Interview: Malware delivered through fake developer job interviews
BeaverTail OtterCookie StoatWaffle InvisibleFerret PylangGhost GolangGhost Contagious Interview
2026-03-09Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains Part 2
GolangGhost PylangGhost GolangGhost
2026-03-02MicrosoftMicrosoft Defender Security Research Team
OAuth redirection abuse enables phishing and malware delivery
2026-02-26GdataG DATA Security Lab
Free games with unexpected costs
HijackLoader
2026-02-25Abstract SecurityAbstract Security Threat Research Organization (ASTRO)
Contagious Interview: Evolution of VS Code and Cursor Tasks Infection Chains - Part 1
BeaverTail PylangGhost GolangGhost
2026-02-19ElasticElastic Security Labs, Salim Bitam
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
AstarionRAT
2026-01-26KrebsOnSecurityBrian Krebs
Who Operates the Badbox 2.0 Botnet?
BADBOX Kimwolf Aisuru
2026-01-20Abstract SecurityAbstract Security Threat Research Organization
Contagious Interview: Tracking the VS Code Tasks Infection Vector
BeaverTail InvisibleFerret
2026-01-20KrebsOnSecurityBrian Krebs
Kimwolf Botnet Lurking in Corporate, Govt. Networks
Kimwolf Aisuru
2026-01-19Swiss Post CybersecurityLouis Schürmann
Don't Judge a PNG by Its Header: PURELOGS Infostealer Analysis
PureLogs Stealer
2026-01-13Security AllianceSecurity Alliance
VS Code Tasks Abuse by Contagious Interview (DPRK)
BeaverTail InvisibleFerret
2026-01-13SecurityLiterateKyle Cucci
Deceiving the Deceivers: A Review of Deception Pro
Formbook
2026-01-08KrebsOnSecurityBrian Krebs
Who Benefited from the Aisuru and Kimwolf Botnets?
Kimwolf Aisuru
2026-01-06ResecurityResecurity
Cyber Counterintelligence (CCI): When 'Shiny Objects' trick 'Shiny Hunters'
2026-01-05SecurityWeekIonut Arghire
Kimwolf Android Botnet Grows Through Residential Proxy Networks
Kimwolf
2026-01-02KrebsOnSecurityBrian Krebs
The Kimwolf Botnet is Stalking Your Local Network
Kimwolf Aisuru
2025-12-30Koi SecurityGal Hachamov, Tuval Admoni
DarkSpectre: Unmasking the Threat Actor Behind 8.8 Million Infected Browsers
DarkSpectre ShadyPanda
2025-12-29LinkedIn (Idan Tarab)Idan Tarab
Active Spear-Phishing Campaign Targeting Israeli Security-Related Individuals — Infrastructure Linked to APT42 (Hashtag#CharmingKitten)
2025-12-18HelpNetSecurityJohn Wilson
Clipping Scripted Sparrow’s wings: Tracking a global phishing ring
Scripted Sparrow