Click here to download all references as Bib-File.•
2025-03-15
⋅
DeXpose
⋅
Understanding SalatStealer: Features and Impact SalatStealer |
2025-03-15
⋅
Github (TheRavenFile)
⋅
IoCs for Anubis Backdoor Anubis Backdoor |
2025-03-14
⋅
Trend Micro
⋅
SocGholish’s Intrusion Techniques Facilitate Distribution of RansomHub Ransomware FAKEUPDATES RansomHub |
2025-03-13
⋅
APNIC
⋅
Botnets never die AIRASHI Aisuru kitty-socks5 |
2025-03-13
⋅
Securonix
⋅
Analyzing OBSCURE#BAT Threat Actors Lure Victims into Executing Malicious Batch Scripts to Deploy Stealthy Rootkits Quasar RAT r77 |
2025-03-13
⋅
EclecticIQ
⋅
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices Black Basta |
2025-03-13
⋅
Cyfirma
⋅
Tracking Ransomware: February 2025 LinkC Pub |
2025-03-13
⋅
Tinyhack.com
⋅
Decrypting Encrypted files from Akira Ransomware (Linux/ESXI variant 2024) using a bunch of GPUs Akira |
2025-03-13
⋅
Group-IB
⋅
ClickFix: The Social Engineering Technique Hackers Use to Manipulate Victims Emmenhtal Lumma Stealer |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-12
⋅
Medium walmartglobaltech
⋅
Golang backdoor with a side of ChromeUpdateAlert App |
2025-03-12
⋅
Youtube (AhmedS Kasmani)
⋅
Initial Analysis of Black Basta Chat Leaks Black Basta Black Basta |
2025-03-12
⋅
YouTube (John Hammond)
⋅
LEAKED Russian Hackers Internal Chats Black Basta Black Basta |
2025-03-12
⋅
CISA
⋅
Medusa Ransomware |
2025-03-12
⋅
Mandiant
⋅
Ghost in the Router: China-Nexus Espionage Actor UNC3886 Targets Juniper Routers tsh |
2025-03-11
⋅
Github (prodaft)
⋅
IOCs for Anubis Backdoor Anubis Backdoor |
2025-03-11
⋅
The Hacker News
⋅
Blind Eagle Hacks Colombian Institutions Using NTLM Flaw, RATs and GitHub-Based Attacks AsyncRAT NjRAT Quasar RAT Remcos |
2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
2025-03-11
⋅
Kaspersky Labs
⋅
DCRat backdoor returns DCRat |
2025-03-11
⋅
Idan Malihi
⋅
DragonForce Ransomware: Unveiling Its Tactics and Impact DragonForce |