Click here to download all references as Bib-File.

Enter keywords to filter the library entries below or Propose new Entry
2026-05-18ZynapOscar Gallego
Zynap’s Next-Gen Sandbox Redefines Automatic Malware Analysis
Black Basta HijackLoader
2026-05-14MicrosoftMicrosoft Threat Intelligence
Kazuar: Anatomy of a nation-state botnet
Kazuar
2026-04-23MandiantJosh Kelley, JP Glab, Muhammad Umair, Tufail Ahmed
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite
SNOWBASIN UNC6692
2026-04-13Dark Web InformerDark Web Informer
Polish Eco-Friendly Retailer VegeHome Suffers Data Breach Exposing 100K+ Customers
LulzIntel
2026-04-02Cisco TalosAsheer Malhotra, Brandon White
UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications
UAT-10608
2026-03-26The RecordDaryna Antoniuk
Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware
Babuk LockBit Bearlyfy
2026-03-26DarktraceIsabel Evans
Phantom Footprints: Tracking GhostSocks Malware
GhostSocks Lumma Stealer
2026-03-23NetomizeMohamad Mokbel
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module
SnappyClient
2026-03-20Nextron SystemsPezier Pierre-Henri
RegPhantom Backdoor Threat Analysis
RegPhantom
2026-02-19ElasticElastic Security Labs, Salim Bitam
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites
AstarionRAT
2026-02-17GoogleDaniel Sislo, Fernando Tomlinson, John Scarbrough, Jr., Nick Harbour, PETER UKHANOV, Rich Reece
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day
BRICKSTORM GRIMBOLT SLAYSTYLE UNC6201
2026-02-04safebreachTomer Bar
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout
Infy StormKittyRAT
2026-01-28AccentureAccenture Cyber Threat Intelligence
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool
RustyRocket
2026-01-27Medium mk7912Manoj Kshirsagar
From XLoader to Phantom Stealer: A DHL-Themed multi-stage Infection Chain
Xloader Phantom Stealer
2025-12-18safebreachTomer Bar
Prince of Persia: A decade of Iranian Nation State APT Campaign Activity
Infy Tonnerre
2025-12-08Trend MicroAliakbar Zahravi
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows
GhostPenguin
2025-11-19SpamhausJonas Arnold
The anatomy of bulletproof hosting – past, present, future
2025-10-22SentinelOneTom Hegel
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation
Princess
2025-10-15Palo Alto Networks Unit 42paloalto Networks: Unit42
PhantomVAI Loader Delivers a Range of Infostealers
Katz Stealer PhantomVAI
2025-10-13ProofpointKyle Cucci, Proofpoint Threat Research Team, Selena Larson, Tommy Madjar
When the monster bytes: tracking TA585 and its arsenal
MonsterV2