Click here to download all references as Bib-File.•
2025-07-04
⋅
Qianxin
⋅
Exclusive disclosure of the attack activities of the APT group “NightEagle” |
2025-07-03
⋅
MalwareTrace
⋅
XWorm Part 1 - Unraveling a Steganography-Based Downloader XWorm |
2025-07-03
⋅
Rapid7
⋅
Scattered Spider: Rapid7 Insights, Observations, and Recommendations MimiKatz POORTRY |
2025-07-02
⋅
0x0d4y
⋅
VELETRIX Loader Dissection: Kill Chain Analysis of China-Nexus Telecommunications Infrastructure Targeting VELETRIX |
2025-07-02
⋅
CrowdStrike
⋅
CrowdStrike Services Observes SCATTERED SPIDER Escalate Attacks Across Industries |
2025-07-02
⋅
Netresec
⋅
PureLogs Forensics PureLogs Stealer |
2025-07-02
⋅
K7 Security
⋅
@mentalpositive’s New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |
2025-07-01
⋅
cocomelonc
⋅
Malware development trick 48: leveraging Office macros for malware. Simple VBA example. |
2025-07-01
⋅
CERT-IL
⋅
DevMan Ransomware Threat Actor Report DEVMAN |
2025-07-01
⋅
ANY.RUN
⋅
DEVMAN Ransomware: Analysis of New DragonForce Variant DEVMAN |
2025-07-01
⋅
SpyCloud
⋅
State Secrets for Sale: More Leaks from the Chinese Hack-for-Hire Industry |
2025-07-01
⋅
Medium walmartglobaltech
⋅
Janela RAT and a stealer extension delivered together JanelaRAT |
2025-07-01
⋅
ANSSI
⋅
Houken: Seeking a Path by Living on The Edge With Zero-Days GOREVERSE |
2025-07-01
⋅
ANSSI
⋅
Houken seeking a path by living on the edge with zero-days GOREshell |
2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
2025-06-30
⋅
ICC
⋅
ICC detects and contains new sophisticated cyber security incident |
2025-06-29
⋅
Medium Sapir Twig
⋅
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat DarkGate |
2025-06-29
⋅
Humpty's RE Blog
⋅
Supper is served Supper |
2025-06-27
⋅
WithSecure
⋅
WEEVILPROXY WEEVILPROXY |
2025-06-27
⋅
axios
⋅
Prolific cybercriminal group now targeting aviation, transportation companies |