Click here to download all references as Bib-File.•
2025-09-30
⋅
Synthient
⋅
GhostSocks: From Initial Access to Residential Proxy GhostSocks |
2025-09-28
⋅
Malasada Tech
⋅
Oyster Malware Delivery via Teams Fake App Broomstick |
2025-09-26
⋅
Arctic Wolf
⋅
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less Akira Akira |
2025-09-26
⋅
BlackPoint
⋅
Malicious Teams Installers Drop Oyster Malware Broomstick |
2025-09-24
⋅
Netresec
⋅
Gh0stKCP Protocol PseudoManuscrypt ValleyRAT |
2025-09-23
⋅
Bleeping Computer
⋅
Cloudflare mitigates new record-breaking 22.2 Tbps DDoS attack Aisuru |
2025-09-23
⋅
Zscaler
⋅
YiBackdoor: A New Malware Family With Links to IcedID and Latrodectus YiBackdoor |
2025-09-22
⋅
Medium Mr.AnyThink
⋅
Hunting For TamperedChef Infostealer TamperedChef |
2025-09-22
⋅
EclecticIQ
⋅
ShinyHunters Calling: Financially Motivated Data Extortion Group Targeting Enterprise Cloud Applications |
2025-09-19
⋅
ESET Research
⋅
Gamaredon X Turla collab PteroGraphin |
2025-09-19
⋅
zensec
⋅
Unmasking Akira: The ransomware tactics you can’t afford to ignore Akira Akira |
2025-09-18
⋅
Hunt.io
⋅
Tracking AsyncRAT via Trojanized ScreenConnect and Open Directories AsyncRAT |
2025-09-18
⋅
Lumen
⋅
SystemBC – Bringing the Noise SystemBC SystemBC |
2025-09-17
⋅
GitLab
⋅
Tech Note - BeaverTail variant distributed via malicious repositories and ClickFix lure BeaverTail OtterCookie BeaverTail InvisibleFerret Beavertail GolangGhost |
2025-09-16
⋅
Wiz.io
⋅
Shai-Hulud: Ongoing Package Supply Chain Worm Delivering Data-Stealing Malware Shai-Hulud |
2025-09-16
⋅
Proofpoint
⋅
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels |
2025-09-16
⋅
Infoblox
⋅
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network |
2025-09-16
⋅
Sekoia
⋅
APT28 Operation Phantom Net Voxel BEARDSHELL GRUNT SLIMAGENT |
2025-09-15
⋅
Zscalar
⋅
SmokeLoader Rises From the Ashes SmokeLoader |
2025-09-14
⋅
cocomelonc
⋅
Malware development: persistence - part 28. CertPropSvc registry hijack. Simple C/C++ example |