Click here to download all references as Bib-File.•
2025-05-01
⋅
Github (VenzoV)
⋅
Deep Dive Fog ransomware Fog |
2025-05-01
⋅
Zscaler
⋅
I StealC You: Tracking the Rapid Changes To StealC Stealc |
2025-04-30
⋅
ZAYOTEM
⋅
Oski Stealer Technical Analysis Report 2025 Oski Stealer |
2025-04-29
⋅
CERT-FR
⋅
Targeting and Compromise of French Entities Using the APT28 Intrusion Set STEELHOOK MASEPIE Mocky LNK OCEANMAP |
2025-04-29
⋅
⋅
France Diplomatie
⋅
Russia – Assignment of cyber attacks against France to the Russian military intelligence service (APT28) (29 April 2025) |
2025-04-29
⋅
Trustwave
⋅
Yet Another NodeJS Backdoor (YaNB): A Modern Challenge KongTuke |
2025-04-29
⋅
Recorded Future
⋅
Uncovering MintsLoader With Recorded Future Malware Intelligence Hunting FAKEUPDATES MintsLoader GhostWeaver Stealc |
2025-04-29
⋅
LinkedIn (Ethical Hackers Academy)
⋅
RansomHub Ransomware Deploys Malware to Breach Corporate Networks FAKEUPDATES RansomHub |
2025-04-28
⋅
Netresec
⋅
Decoding njRAT traffic with NetworkMiner NjRAT |
2025-04-25
⋅
HiSolutions
⋅
Rolling in the Deep(Web): Lazarus Tsunami tsunami |
2025-04-25
⋅
Censys
⋅
The Persistent Threat of Salt Typhoon: Tracking Exposures of Potentially Targeted Devices MASOL |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-24
⋅
Mandiant
⋅
M-Trends 2025 Report Akira Black Basta LockBit SystemBC GootLoader LockBit WIREFIRE Akira Black Basta Cobalt Strike LockBit RansomHub SystemBC |
2025-04-24
⋅
Positive Technologies
⋅
Crypters And Tools. Part 2: Different Paws — Same Tangle |
2025-04-24
⋅
0xreverse
⋅
Understanding Alcatraz ~ Obfuscator Analysis [EN] |
2025-04-24
⋅
Silent Push
⋅
Contagious Interview (DPRK) Launches a New Campaign Creating Three Front Companies to Deliver a Trio of Malware: BeaverTail, InvisibleFerret, and OtterCookie BeaverTail OtterCookie FrostyFerret GolangGhost InvisibleFerret GolangGhost |
2025-04-23
⋅
Microsoft
⋅
Understanding the threat landscape for Kubernetes and containerized assets Storm-1977 |
2025-04-23
⋅
Trend Micro
⋅
Russian Infrastructure Plays Crucial Role in North Korean Cybercrime Operations BeaverTail FrostyFerret GolangGhost InvisibleFerret GolangGhost |
2025-04-23
⋅
Medium b.magnezi
⋅
AsyncRAT Malware Analysis AsyncRAT |
2025-04-22
⋅
SentinelOne
⋅
What Is Fog Ransomware? Fog |