Click here to download all references as Bib-File.•
2025-03-11
⋅
Juniper Networks
⋅
The RedPenguin Malware Incident tsh |
2025-03-11
⋅
Github (prodaft)
⋅
IOCs for Anubis Backdoor Anubis Backdoor |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
2025-03-11
⋅
Kaspersky Labs
⋅
DCRat backdoor returns DCRat |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-10
⋅
LevelBlue
⋅
Prevent, Detect, Contain: LevelBlue MDR’s Guide Against Black Basta Affiliates’ Attacks Black Basta Black Basta ReedBed |
2025-03-10
⋅
Check Point Research
⋅
Blind Eagle: …And Justice for All Remcos |
2025-03-10
⋅
Socket
⋅
Lazarus Strikes npm Again with New Wave of Malicious Packages |
2025-03-07
⋅
Fortinet
⋅
Investigating Iranian Intrusion into Strategic Middle East Critical Infrastructure Havoc |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-03-07
⋅
MalwareAnalysisSpace
⋅
Akira Ransomware Expands to Linux: the attacking abilities and strategies Akira |
2025-03-06
⋅
⋅
Orange Cyberdefense
⋅
Dossier Bybit : Le plus gros hack de l’histoire de la finance |
2025-03-06
⋅
flare
⋅
Deciphering Black Basta’s Infrastructure from the Chat Leak Black Basta Black Basta |
2025-03-06
⋅
Outpost24
⋅
Unveiling EncryptHub: Analysis of a multi-stage malware campaign Rhadamanthys |
2025-03-06
⋅
Palo Alto Networks Unit 42
⋅
The Next Level: Typo DGAs Used in Malicious Redirection Chains |
2025-03-06
⋅
Medium SarvivaMalwareAnalyst
⋅
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication XWorm |
2025-03-05
⋅
HUMAN
⋅
Satori Threat Intelligence Disruption: BADBOX 2.0 Targets Consumer Devices with Multiple Fraud Schemes BADBOX |
2025-03-05
⋅
eSentire
⋅
Initial Takeaways from the Black Basta Chat Leaks Black Basta Black Basta |
2025-03-05
⋅
CyberScoop
⋅
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement |