Click here to download all references as Bib-File.•
| 2025-10-31
            
            ⋅
            
            Expel
            ⋅
            
             Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates Broomstick  | 
| 2025-10-30
            
            ⋅
            
            Twitter (@DarkWebInformer)
            ⋅
            
             Tweet about Aisuru C2 being on top of Cloudflare Radar / Top100 domain Aisuru  | 
| 2025-10-28
            
            ⋅
            
            Kaspersky
            ⋅
            
             Crypto wasted: BlueNoroff’s ghost mirage of funding and jobs  | 
| 2025-10-27
            
            ⋅
            
            Kaspersky
            ⋅
            
             Mem3nt0 mori – The Hacking Team is back!  | 
| 2025-10-23
            
            ⋅
            
            ESET Research
            ⋅
            
             Gotta fly: Lazarus targets the UAV sector QuanPinLoader ScoringMathTea  | 
| 2025-10-22
            
            ⋅
            
            Trend Micro
            ⋅
            
             The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns Cobalt Strike DracuLoader ShadowPad  | 
| 2025-10-22
            
            ⋅
            
            SentinelOne
            ⋅
            
             PhantomCaptcha | Multi-Stage WebSocket RAT Targets Ukraine in Single-Day Spearphishing Operation Princess  | 
| 2025-10-22
            
            ⋅
            
            Cyderes
            ⋅
            
             Chrome Installer Impersonation Campaign Targets China-Based Victims with ValleyRAT Trojan BlindEDR ValleyRAT  | 
| 2025-10-21
            
            ⋅
            
            HarfangLab
            ⋅
            
             RudePanda owns IIS servers like it's 2003 TOLLBOOTH  | 
| 2025-10-21
            
            ⋅
            
            Elastic
            ⋅
            
             TOLLBOOTH: What's yours, IIS mine TOLLBOOTH  | 
| 2025-10-20
            
            ⋅
            
            Darktrace
            ⋅
            
             Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion SNAPPYBEE  | 
| 2025-10-20
            
            ⋅
            
            Medium Deriv-Tech
            ⋅
            
             How a fake AI recruiter delivers five staged malware disguised as a dream job BeaverTail OtterCookie InvisibleFerret  | 
| 2025-10-20
            
            ⋅
            
            Google
            ⋅
            
             To Be (A Robot) or Not to Be: New Malware Attributed to Russia State-Sponsored COLDRIVER MAYBEROBOT NOROBOT YESROBOT  | 
| 2025-10-20
            
            ⋅
            
            Ransom-ISAC
            ⋅
            
             Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1) JADESNOW  | 
| 2025-10-19
            
            ⋅
            
            
            ⋅
            
            CNCERT
            ⋅
            
             Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks DanderSpritz  | 
| 2025-10-18
            
            ⋅
            
            Koi Security
            ⋅
            
             GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace GlassWorm  | 
| 2025-10-18
            
            ⋅
            
            Medium 0xzyadelzyat
            ⋅
            
             PureLogs Stealer: Complete Malware Analysis & CTF Walkthrough PureLogs Stealer  | 
| 2025-10-16
            
            ⋅
            
            Hunt.io
            ⋅
            
             Odyssey Stealer and AMOS Campaign Targets macOS Developers Through Fake Tools AMOS  | 
| 2025-10-16
            
            ⋅
            
            Swisscom B2B CSIRT
            ⋅
            
             Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution ACR Stealer  | 
| 2025-10-16
            
            ⋅
            
            Mandiant
            ⋅
            
             DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains JADESNOW  |