Click here to download all references as Bib-File.•
| 2025-10-19
⋅
⋅
CNCERT
⋅
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks DanderSpritz |
| 2025-10-18
⋅
Koi Security
⋅
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace GlassWorm |
| 2025-10-02
⋅
Security Affairs
⋅
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories Crimson Collective |
| 2025-10-02
⋅
CyberSecurityNews
⋅
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Crimson Collective |
| 2025-09-30
⋅
K7 Security
⋅
PatchWork APT |
| 2025-09-25
⋅
Koi Security
⋅
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails |
| 2025-09-07
⋅
Hexastrike Cybersecurity
⋅
ValleyRAT Exploiting BYOVD to Kill Endpoint Security ValleyRAT |
| 2025-08-27
⋅
StepSecurity
⋅
Supply Chain Security Alert: Popular Nx Build System Package Compromised with Data-Stealing Malware s1ngularity Stealer |
| 2025-08-22
⋅
K7 Security
⋅
Examining the tactics of BQTLOCK Ransomware & its variants BQTlock |
| 2025-08-21
⋅
GBHackers on Security
⋅
Threat Actors Weaponize PDF Editor Trojan to Convert Devices into Proxies TamperedChef |
| 2025-08-21
⋅
Swiss Post Cybersecurity
⋅
The ClickFix Deception: How a Fake CAPTCHA Deploys an Evasive Infostealer donut_injector |
| 2025-08-08
⋅
K7 Security
⋅
Silent Watcher: Dissecting Cmimai Stealer’s VBS Payload Cmimai Stealer |
| 2025-07-30
⋅
GBHackers on Security
⋅
Lazarus Group enhances malware delivery by using new techniques OtterCookie |
| 2025-07-19
⋅
Eye Security
⋅
SharePoint 0-day uncovered (CVE-2025-53770) SharPyShell |
| 2025-07-17
⋅
NJCCIC
⋅
ClickFix Leading to MonsterV2 Infostealer MonsterV2 |
| 2025-07-17
⋅
⋅
Cert-UA
⋅
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039) LAMEHUG |
| 2025-07-08
⋅
Acronis
⋅
SafePay ransomware: the fast rising threat targeting MSPs SafePay |
| 2025-07-08
⋅
Koi Security
⋅
Google and Microsoft Trusted Them. 2.3 Million Users Installed Them. They Were Malware. |
| 2025-07-07
⋅
CyberSecurityNews
⋅
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware NightEagle |
| 2025-07-02
⋅
K7 Security
⋅
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |