Click here to download all references as Bib-File.•
2025-06-26
⋅
Arctic Wolf
⋅
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations GIFTEDCROOK |
2025-06-23
⋅
PolySwarm Tech Team
⋅
Famous Chollima’s PylangGhost GolangGhost PylangGhost GolangGhost |
2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |
2025-06-16
⋅
SecurityScorecard
⋅
Checking all the Boxes: LapDogs, The New ORB in Town ShortLeash ShortLeash |
2025-06-15
⋅
Positive Technologies
⋅
Team46 and TaxOff: two sides of the same coin Cobalt Strike |
2025-06-12
⋅
Symantec
⋅
Fog Ransomware: Unusual Toolset Used in Recent Attack Fog |
2025-06-09
⋅
Zscaler
⋅
DanaBleed: DanaBot C2 Server Memory Leak Bug DanaBot |
2025-05-19
⋅
The DFIR Report
⋅
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Mimic Ransomware MimiKatz |
2025-05-14
⋅
Zscaler
⋅
Technical Analysis of TransferLoader TransferLoader |
2025-05-02
⋅
Arctic Wolf
⋅
Venom Spider Uses Server-Side Polymorphism to Weave a Web Around Victims More_eggs |
2025-05-01
⋅
Fortinet
⋅
FortiGuard Incident Response Team Detects Intrusion into Middle East Critical National Infrastructure Havoc |
2025-05-01
⋅
Zscaler
⋅
I StealC You: Tracking the Rapid Changes To StealC Stealc |
2025-04-28
⋅
Censys
⋅
Scouting a Threat Actor |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-16
⋅
IBM X-Force
⋅
IBM X-Force 2025 Threat Intelligence Index |
2025-04-11
⋅
Bitso Quetzal Team
⋅
Interview with the Chollima BeaverTail OtterCookie InvisibleFerret |
2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
2025-04-10
⋅
Symantec
⋅
Shuckworm Targets Foreign Military Mission Based in Ukraine |
2025-04-08
⋅
Team Cymru
⋅
Inside DanaBot’s Infrastructure: In Support of Operation Endgame II DanaBot |
2025-04-03
⋅
ThreatMon
⋅
Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report |