Click here to download all references as Bib-File.•
2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
2025-09-30
⋅
Palo Alto Networks Unit 42
⋅
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite NET-STAR |
2025-09-19
⋅
BlackPoint
⋅
KeyZero: A Custom PowerShell RAT |
2025-09-16
⋅
Sekoia
⋅
APT28 Operation Phantom Net Voxel BEARDSHELL GRUNT SLIMAGENT |
2025-08-28
⋅
Defentive
⋅
The Phantom Threat: Inside UNC5518’s Invisible Empire of MetaStealer Operations MetaStealer |
2025-08-27
⋅
Defentive
⋅
Anatomy of a Real Phishing Attack: How Defentive Detected and Stopped It in Action |
2025-07-22
⋅
Recorded Future
⋅
Anatomy of DDoSia: NoName057(16)'s DDoS Infrastructure and Targeting Dosia |
2025-07-22
⋅
Akamai
⋅
Coyote in the Wild: First-Ever Malware That Abuses UI Automation |
2025-07-21
⋅
SentinelOne
⋅
SharePoint ToolShell | Zero-Day Exploited in-the-Wild Targets Enterprise Servers |
2025-07-16
⋅
Reverse The Malware
⋅
Analysis CryptoMiner Sample ( Script Based ) |
2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |
2025-06-09
⋅
Sentinel LABS
⋅
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets GOREshell Nimbo-C2 ShadowPad |
2025-05-28
⋅
Rapid7
⋅
NSIS Abuse and sRDI Shellcode: Anatomy of the Winos 4.0 Campaign Winos |
2025-05-28
⋅
Trustwave
⋅
PhaaS the Secrets: The Hidden Ties Between Tycoon2FA and Dadsec's Operations |
2025-05-27
⋅
Trend Micro
⋅
Earth Lamia Develops Custom Arsenal to Target Multiple Industries BypassBoss Cobalt Strike JuicyPotato PULSEPACK STOWAWAY Vshell |
2025-05-22
⋅
ESET Research
⋅
Danabot: Analyzing a fallen empire DanaBot |
2025-05-20
⋅
Sarcoma Ransomware Unveiled: Anatomy of a Double Extortion Gang Sarcoma |
2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
2025-04-22
⋅
Volexity
⋅
Phishing for Codes: Russian Threat Actors Target Microsoft 365 OAuth Workflows UTA0352 UTA0355 |
2025-04-14
⋅
Palo Alto Networks Unit 42
⋅
Slow Pisces Targets Developers With Coding Challenges and Introduces New Customized Python Malware RN Stealer |