Click here to download all references as Bib-File.•
2025-03-20
⋅
ESET Research
⋅
Operation FishMedley ShadowPad SodaMaster Spyder |
2025-03-20
⋅
Cisco Talos
⋅
UAT-5918 targets critical infrastructure entities in Taiwan LaZagne JuicyPotato Meterpreter MimiKatz |
2025-03-20
⋅
Denwp Research
⋅
Reversing FUD AMOS Stealer AMOS |
2025-03-18
⋅
WeLiveSecurity
⋅
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor Anel AsyncRAT |
2025-03-16
⋅
Analyzing the RedTiger Malware Stealer RedTiger Stealer |
2025-03-14
⋅
VitalDigitalForensics
⋅
Lumma Stealer – A tale that starts with a fake Captcha Lumma Stealer |
2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
2025-03-14
⋅
Twitter (@CERTCyberdef)
⋅
Tweet on Emmenhtal v3 Emmenhtal Lumma Stealer Rhadamanthys |
2025-03-13
⋅
Securonix
⋅
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits Quasar RAT r77 |
2025-03-13
⋅
EclecticIQ
⋅
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices Black Basta |
2025-03-13
⋅
Forescout
⋅
New Ransomware Operator Exploits Fortinet Vulnerability Duo BlackMatter LockBit Mora_001 |
2025-03-13
⋅
Cyfirma
⋅
Tracking Ransomware: February 2025 LinkC Pub |
2025-03-13
⋅
Infoblox
⋅
Work Hard, Pay Harder! |
2025-03-13
⋅
Tinyhack.com
⋅
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs Akira |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-13
⋅
Medium walmartglobaltech
⋅
ArechClient; Decoding IOCs and finding the onboard browser extension SectopRAT |
2025-03-12
⋅
Red Canary
⋅
2025 Threat Detection Report HijackLoader Lumma Stealer NetSupportManager RAT |
2025-03-12
⋅
Mandiant
⋅
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers tsh |
2025-03-12
⋅
Lookout
⋅
Lookout Discovers New Spyware by North Korean APT37 KoSpy |