Click here to download all references as Bib-File.•
2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
2025-03-14
⋅
Twitter (@CERTCyberdef)
⋅
Tweet on Emmenhtal v3 Emmenhtal Lumma Stealer Rhadamanthys |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-12
⋅
Mandiant
⋅
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers tsh |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
2025-03-11
⋅
Kaspersky Labs
⋅
DCRat backdoor returns DCRat |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-10
⋅
Cofense
⋅
Trump Cryptocurrency Delivers ConnectWise RAT |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-03-07
⋅
MalwareAnalysisSpace
⋅
Akira Ransomware Expands to Linux: the attacking abilities and strategies Akira |
2025-03-06
⋅
Twitter (@MsftSecIntel)
⋅
Tweet about Moonstone Sleet dropping Qilin ransomware Qilin |
2025-03-06
⋅
Medium SarvivaMalwareAnalyst
⋅
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication XWorm |
2025-03-05
⋅
CyberScoop
⋅
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement |
2025-03-05
⋅
Microsoft
⋅
Silk Typhoon targeting IT supply chain |
2025-03-04
⋅
c/side
⋅
Thousands of websites hit by four backdoors in 3rd party JavaScript attack |
2025-03-04
⋅
⋅
Genians
⋅
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack Quasar RAT |
2025-03-04
⋅
Department of Justice
⋅
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government |
2025-03-04
⋅
Hunt.io
⋅
Exposing Russian EFF Impersonators: The Inside Story on Stealc & Pyramid C2 Pyramid Stealc |