Click here to download all references as Bib-File.•
| 2026-05-18
⋅
Zynap
⋅
Zynap’s Next-Gen Sandbox Redefines Automatic Malware Analysis Black Basta HijackLoader |
| 2026-05-14
⋅
Microsoft
⋅
Kazuar: Anatomy of a nation-state botnet Kazuar |
| 2026-04-23
⋅
Mandiant
⋅
Snow Flurries: How UNC6692 Employed Social Engineering to Deploy a Custom Malware Suite SNOWBASIN UNC6692 |
| 2026-04-13
⋅
Dark Web Informer
⋅
Polish Eco-Friendly Retailer VegeHome Suffers Data Breach Exposing 100K+ Customers LulzIntel |
| 2026-04-02
⋅
Cisco Talos
⋅
UAT-10608: Inside a large-scale automated credential harvesting operation targeting web applications UAT-10608 |
| 2026-03-26
⋅
The Record
⋅
Pro-Ukraine hacker group Bearlyfy targets Russian companies with custom ransomware Babuk LockBit Bearlyfy |
| 2026-03-26
⋅
Darktrace
⋅
Phantom Footprints: Tracking GhostSocks Malware GhostSocks Lumma Stealer |
| 2026-03-23
⋅
Netomize
⋅
Detect SnappyClient C&C Traffic Using PacketSmith + Yara-X Detection Module SnappyClient |
| 2026-03-20
⋅
Nextron Systems
⋅
RegPhantom Backdoor Threat Analysis RegPhantom |
| 2026-02-19
⋅
Elastic
⋅
MIMICRAT: ClickFix Campaign Delivers Custom RAT via Compromised Legitimate Websites AstarionRAT |
| 2026-02-17
⋅
Google
⋅
From BRICKSTORM to GRIMBOLT: UNC6201 Exploiting a Dell RecoverPoint for Virtual Machines Zero-Day BRICKSTORM GRIMBOLT SLAYSTYLE UNC6201 |
| 2026-02-04
⋅
safebreach
⋅
Prince of Persia, Part II: Covering Tracks, Striking Back & a Revealing Link to the Iranian Regime Amid the Country’s Internet Blackout Infy StormKittyRAT |
| 2026-01-28
⋅
Accenture
⋅
Analysis of RustyRocket – A Custom WorldLeaks Exfiltration Tool RustyRocket |
| 2026-01-27
⋅
Medium mk7912
⋅
From XLoader to Phantom Stealer: A DHL-Themed multi-stage Infection Chain Xloader Phantom Stealer |
| 2025-12-18
⋅
safebreach
⋅
Prince of Persia: A decade of Iranian Nation State APT Campaign Activity Infy Tonnerre |
| 2025-12-08
⋅
Trend Micro
⋅
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows GhostPenguin |
| 2025-11-19
⋅
Spamhaus
⋅
The anatomy of bulletproof hosting – past, present, future |
| 2025-10-22
⋅
SentinelOne
⋅
PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation Princess |
| 2025-10-15
⋅
Palo Alto Networks Unit 42
⋅
PhantomVAI Loader Delivers a Range of Infostealers Katz Stealer PhantomVAI |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |