Click here to download all references as Bib-File.•
2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
2025-03-14
⋅
Twitter (@CERTCyberdef)
⋅
Tweet on Emmenhtal v3 Emmenhtal Lumma Stealer Rhadamanthys |
2025-03-13
⋅
Infoblox
⋅
Work Hard, Pay Harder! |
2025-03-13
⋅
Tinyhack.com
⋅
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs Akira |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-13
⋅
Medium walmartglobaltech
⋅
ArechClient; Decoding IOCs and finding the onboard browser extension SectopRAT |
2025-03-12
⋅
Mandiant
⋅
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers tsh |
2025-03-12
⋅
Lookout
⋅
Lookout Discovers New Spyware by North Korean APT37 KoSpy |
2025-03-11
⋅
Hunt.io
⋅
JSPSpy and ‘filebroser’: A Custom File Management Tool in Webshell Infrastructure |
2025-03-11
⋅
Juniper Networks
⋅
The RedPenguin Malware Incident tsh |
2025-03-11
⋅
Github (prodaft)
⋅
IOCs for Anubis Backdoor Anubis Backdoor |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
2025-03-11
⋅
Kaspersky Labs
⋅
DCRat backdoor returns DCRat |
2025-03-11
⋅
Idan Malihi
⋅
DragonForce Ransomware: Unveiling Its Tactics and Impact DragonForce |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-10
⋅
Check Point Research
⋅
Blind Eagle: …And Justice for All Remcos |
2025-03-10
⋅
Socket
⋅
Lazarus Strikes npm Again with New Wave of Malicious Packages |
2025-03-10
⋅
Cofense
⋅
Trump Cryptocurrency Delivers ConnectWise RAT |