Click here to download all references as Bib-File.•
2025-03-18
⋅
WeLiveSecurity
⋅
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor Anel AsyncRAT |
2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
2025-03-13
⋅
Securonix
⋅
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits Quasar RAT r77 |
2025-03-13
⋅
EclecticIQ
⋅
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices Black Basta |
2025-03-13
⋅
Cyfirma
⋅
Tracking Ransomware: February 2025 LinkC Pub |
2025-03-13
⋅
Tinyhack.com
⋅
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs Akira |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-12
⋅
Mandiant
⋅
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers tsh |
2025-03-11
⋅
Github (prodaft)
⋅
IOCs for Anubis Backdoor Anubis Backdoor |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
2025-03-11
⋅
Kaspersky Labs
⋅
DCRat backdoor returns DCRat |
2025-03-11
⋅
Idan Malihi
⋅
DragonForce Ransomware: Unveiling Its Tactics and Impact DragonForce |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-10
⋅
Socket
⋅
Lazarus Strikes npm Again with New Wave of Malicious Packages |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-03-07
⋅
MalwareAnalysisSpace
⋅
Akira Ransomware Expands to Linux: the attacking abilities and strategies Akira |
2025-03-06
⋅
Medium SarvivaMalwareAnalyst
⋅
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication XWorm |
2025-03-05
⋅
CyberScoop
⋅
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement |