Click here to download all references as Bib-File.•
2025-06-19
⋅
cocomelonc
⋅
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example |
2025-06-18
⋅
Securonix
⋅
Analyzing SERPENTINE#CLOUD: Threat Actors Abuse Cloudflare Tunnels to Infect Systems with Stealthy Python-Based Malware |
2025-06-18
⋅
Check Point Research
⋅
Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data |
2025-06-18
⋅
Elastic
⋅
A Wretch Client: From ClickFix deception to information stealer deployment HijackLoader Lumma Stealer SectopRAT |
2025-06-18
⋅
Huntress Labs
⋅
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion |
2025-06-17
⋅
Trend Micro
⋅
Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet Flodrix |
2025-06-17
⋅
Palo Alto Networks Unit 42
⋅
Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation KimJongRat |
2025-06-17
⋅
DARKReading
⋅
Operation Endgame: Do Takedowns and Arrests Matter? BumbleBee Emotet Pikabot SmokeLoader TrickBot |
2025-06-16
⋅
Glueck Kanja
⋅
Inside Akira Stealer: A full technical analysis of a modular stealer Akira Stealer |
2025-06-16
⋅
SecurityScorecard
⋅
Checking all the Boxes: LapDogs, The New ORB in Town ShortLeash ShortLeash |
2025-06-14
⋅
K7 Security
⋅
SpectraRansomware Chaos |
2025-06-13
⋅
Recorded Future
⋅
GrayAlpha Uses Diverse Infection Vectors to Deploy PowerNet Loader and NetSupport RAT EugenLoader POWERTRASH NetSupportManager RAT |
2025-06-12
⋅
Check Point Research
⋅
From Trust to Threat: Hijacked Discord Invites Used for Multi-Stage Malware Delivery AsyncRAT Skuld |
2025-06-12
⋅
Infoblox
⋅
Vexing and Vicious: The Eerie Relationship between WordPress Hackers and an Adtech Cabal DollyWay |
2025-06-12
⋅
CitizenLab
⋅
Graphite Caught: First Forensic Confirmation of Paragon’s iOS Mercenary Spyware Finds Journalists Targeted |
2025-06-12
⋅
Symantec
⋅
Fog Ransomware: Unusual Toolset Used in Recent Attack Fog |
2025-06-12
⋅
cocomelonc
⋅
MacOS hacking part 1: stealing data via legit Telegram API. Simple C example |
2025-06-11
⋅
Interpol
⋅
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown |
2025-06-10
⋅
Check Point Research
⋅
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage Horus |
2025-06-09
⋅
Sentinel LABS
⋅
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets GOREshell Nimbo-C2 ShadowPad |