Click here to download all references as Bib-File.•
2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
2025-03-20
⋅
Cisco Talos
⋅
UAT-5918 targets critical infrastructure entities in Taiwan ShortLeash LaZagne JuicyPotato Meterpreter MimiKatz ShortLeash UAT-5918 |
2025-03-20
⋅
ESET Research
⋅
Operation FishMedley ShadowPad SodaMaster Spyder Earth Lusca FishMedley |
2025-03-19
⋅
cocomelonc
⋅
MD MZ Book: Russian translation |
2025-03-19
⋅
Natto Thoughts
⋅
Zhou Shuai: A Hacker’s Road to APT27 |
2025-03-18
⋅
Trellix
⋅
Analysis of Black Basta Ransomware Chat Leaks Black Basta Black Basta |
2025-03-18
⋅
Expel
⋅
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back) Black Basta Black Basta |
2025-03-18
⋅
WeLiveSecurity
⋅
Operation AkaiRyū: MirrorFace invites Europe to Expo 2025 and revives ANEL backdoor Anel AsyncRAT |
2025-03-17
⋅
GoDaddy
⋅
DollyWay World Domination: Eight Years of Evolving Website Malware Campaigns DollyWay |
2025-03-17
⋅
Cloudflare
⋅
Black Basta’s blunder: exploiting the gang’s leaked chats Black Basta Black Basta |
2025-03-16
⋅
SYGNIA
⋅
Bybit – What We Know So Far |
2025-03-15
⋅
DeXpose
⋅
Understanding SalatStealer: Features and Impact SalatStealer |
2025-03-14
⋅
VitalDigitalForensics
⋅
Lumma Stealer – A tale that starts with a fake Captcha Lumma Stealer |
2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
2025-03-14
⋅
Twitter (@CERTCyberdef)
⋅
Tweet on Emmenhtal v3 Emmenhtal Lumma Stealer Rhadamanthys |
2025-03-13
⋅
Securonix
⋅
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits Quasar RAT r77 |
2025-03-13
⋅
EclecticIQ
⋅
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices Black Basta |
2025-03-13
⋅
Forescout
⋅
New Ransomware Operator Exploits Fortinet Vulnerability Duo BlackMatter LockBit Mora_001 |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |