Click here to download all references as Bib-File.•
2025-02-04
⋅
Trend Micro
⋅
CVE-2025-0411: Ukrainian Organizations Targeted in Zero-Day Campaign and Homoglyph Attacks SmokeLoader |
2025-02-03
⋅
SentinelOne
⋅
macOS FlexibleFerret | Further Variants of DPRK Malware Family Unearthed FlexibleFerret FriendlyFerret FrostyFerret |
2025-02-03
⋅
TEHTRIS
⋅
LegionLoader exposed Satacom |
2025-01-30
⋅
Bitdefender
⋅
UAC-0063: Cyber Espionage Operation Expanding from Central Asia HATVIBE |
2025-01-30
⋅
Bleeping Computer
⋅
Backdoor found in two healthcare patient monitors, linked to IP in China |
2025-01-30
⋅
CISA
⋅
Contec CMS8000 Contains a Backdoor CMS8000 Backdoor |
2025-01-30
⋅
Department of Justice
⋅
Cybercrime websites selling hacking tools to transnational organized crime groups seized |
2025-01-30
⋅
RevEng.AI
⋅
One ClickFix and LummaStealer reCAPTCHA’s Our Attention - Part 1 Lumma Stealer |
2025-01-30
⋅
⋅
Intrinsec
⋅
Telegram Stories: voice spoofers, tools and operating modes |
2025-01-29
⋅
SecurityScorecard
⋅
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign BeaverTail InvisibleFerret |
2025-01-29
⋅
Socket
⋅
North Korean APT Lazarus Targets Developers with Malicious npm Package BeaverTail InvisibleFerret |
2025-01-29
⋅
Google
⋅
ScatterBrain: Unmasking the Shadow of PoisonPlug's Obfuscator POISONPLUG ShadowPad SNAPPYBEE |
2025-01-28
⋅
Twitter (@anyrun_app)
⋅
Tweet on Linux version of SystemBC SystemBC |
2025-01-28
⋅
Hunt.io
⋅
SparkRAT: Server Detection, macOS Activity, and Malicious Connections SparkRAT |
2025-01-27
⋅
The DFIR Report
⋅
Cobalt Strike and a Pair of SOCKS Lead to LockBit Ransomware GhostSocks LockBit SystemBC |
2025-01-27
⋅
SecurityScorecard
⋅
Operation Phantom Circuit: North Korea’s Global Data Exfiltration Campaign |
2025-01-27
⋅
Youtube (MalwareAnalysisForHedgehogs)
⋅
Malware Analysis - Binary Refinery URL extraction of Multi-Layered PoshLoader for LummaStealer Lumma Stealer |
2025-01-24
⋅
Intrinsec
⋅
"Premium panel": phishing tool used in longstanding campaigns worldwide |
2025-01-23
⋅
Netskope
⋅
Lumma Stealer: Fake CAPTCHAs & New Techniques to Evade Detection Lumma Stealer |
2025-01-23
⋅
Hunt.io
⋅
Mapping Suspected KEYPLUG Infrastructure: TLS Certificates, GhostWolf, and RedGolf/APT41 Activity KEYPLUG |