Click here to download all references as Bib-File.•
| 2025-11-25
⋅
Arctic Wolf
⋅
Russian RomCom Utilizing SocGholish to Deliver Mythic Agent to U.S. Companies Supporting Ukraine FAKEUPDATES |
| 2025-11-22
⋅
LinkedIn (Idan Tarab)
⋅
India‑Aligned "Dropping Elephant" Pushes a New Stealth Marshalled‑Python Backdoor via MSBuild Dropper in Observed Activity Targeting Pakistan’s Defense Sector |
| 2025-11-20
⋅
Google
⋅
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks BADAUDIO Cobalt Strike |
| 2025-11-19
⋅
NetAskari Substack
⋅
Critical strike: China's hacking training grounds (PART 1) |
| 2025-11-19
⋅
Natto Thoughts
⋅
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs |
| 2025-11-19
⋅
Amazon
⋅
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare |
| 2025-11-19
⋅
SecurityScorecard
⋅
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign |
| 2025-11-19
⋅
ESET Research
⋅
PlushDaemon compromises network devices for adversary-in-the-middle attacks EdgeStepper LittleDaemon |
| 2025-11-18
⋅
Oligo
⋅
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet IronErn440 |
| 2025-11-18
⋅
DataBreaches.net
⋅
From bad to worse: Doctor Alliance hacked again by same threat actor (2) Kazu |
| 2025-11-18
⋅
⋅
Cert-UA
⋅
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329) GAMYBEAR UAC-0241 |
| 2025-11-17
⋅
KELA
⋅
ByteToBreach: A Deep Dive into a Persistent Data Leak Operator ByteToBreach |
| 2025-11-17
⋅
moldovalive
⋅
War in the shadows of servers: how a Russian company could have organized an attack against Stark Industries from Moldova |
| 2025-11-17
⋅
0x0d4y
⋅
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea ScoringMathTea |
| 2025-11-14
⋅
Github (cocomelonc)
⋅
Linux hacking part 8: Linux password-protected bind shell. Simple NASM example |
| 2025-11-13
⋅
Trend Micro
⋅
Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics Lumma Stealer Water Kurita |
| 2025-11-13
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3) JADESNOW |
| 2025-11-13
⋅
NVISO Labs
⋅
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery BeaverTail OtterCookie InvisibleFerret Beavertail TsunamiKit |
| 2025-11-11
⋅
Botcrawl
⋅
National Civil Service Commission of Colombia Data Breach Exposes 2.9 TB of Government Files Kazu |
| 2025-11-10
⋅
Mandiant
⋅
No Place Like Localhost: Unauthenticated Remote Access via Triofox Vulnerability CVE-2025-12480 UNC6485 |