Click here to download all references as Bib-File.•
| 2025-11-04
⋅
Twitter (@nextronresearch)
⋅
Tweet about BQT ransomware on Linux BQTlock |
| 2025-10-15
⋅
Symantec
⋅
Jewelbug: Chinese APT Group Widens Reach to Russia |
| 2025-10-14
⋅
Reliaquest
⋅
SOE-phisticated Persistence: Inside Flax Typhoon's ArcGIS Compromise |
| 2025-10-13
⋅
⋅
Logpresso
⋅
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
| 2025-10-07
⋅
Rapid7
⋅
Crimson Collective: A New Threat Group Observed Operating in the Cloud |
| 2025-10-07
⋅
Aryaka Networks
⋅
Vietnamese Threat Group Uses Vampire Bot to Target Digital Professionals Vampire Bot |
| 2025-10-06
⋅
Microsoft
⋅
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability MedusaLocker |
| 2025-10-02
⋅
CyberSecurityNews
⋅
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Crimson Collective |
| 2025-10-01
⋅
Aisuru DDoS Campaign: Threat Intelligence Assessment Aisuru |
| 2025-09-30
⋅
Infoblox
⋅
Detour Dog: DNS Malware Powers Strela Stealer Campaigns StrelaStealer |
| 2025-09-16
⋅
Proofpoint
⋅
Going Underground: China-aligned TA415 Conducts U.S.-China Economic Relations Targeting Using VS Code Remote Tunnels |
| 2025-09-16
⋅
Infoblox
⋅
Deniability by Design: DNS-Driven Insights into a Malicious Ad Network |
| 2025-09-15
⋅
DeXpose
⋅
Threat Actor Profile: APT27 |
| 2025-09-15
⋅
Huntress Labs
⋅
Huntress Threat Advisory: The Dangers of Storing Unencrypted Passwords Akira |
| 2025-09-04
⋅
SentinelOne
⋅
Contagious Interview | North Korean Threat Actors Reveal Plans and Ops by Abusing Cyber Intel Platforms ContagiousDrop |
| 2025-09-04
⋅
eSentire
⋅
New Botnet Emerges from the Shadows: NightshadeC2 NightshadeC2 NightshadeC2 |
| 2025-08-28
⋅
Defentive
⋅
The Phantom Threat: Inside UNC5518’s Invisible Empire of MetaStealer Operations MetaStealer |
| 2025-08-27
⋅
Anthropic
⋅
Anthropic - Threat Intelligence Report: August 2025 BeaverTail OtterCookie GolangGhost InvisibleFerret GolangGhost |
| 2025-08-27
⋅
Defentive
⋅
Anatomy of a Real Phishing Attack: How Defentive Detected and Stopped It in Action |