Click here to download all references as Bib-File.•
| 2025-11-10
⋅
Genians
⋅
State-Sponsored Remote Wipe Tactics Targeting Android Devices Quasar RAT Remcos |
| 2025-11-07
⋅
ENKI
⋅
Lazarus Group targets Aerospace and Defense with new Comebacker variant ComeBacker |
| 2025-11-05
⋅
Google
⋅
GTIG AI Threat Tracker: Advances in Threat Actor Usage of AI Tools PromptLock UNC1069 |
| 2025-11-05
⋅
ESET Research
⋅
APT Activity: Russia-Aligned APTs Ramp Up Attacks Against Ukraine and Its Strategic Partners (April 2025 – September 2025 Report) |
| 2025-11-04
⋅
Bitdefender
⋅
Curly COMrades: Evasion and Persistence via Hidden Hyper-V Virtual Machines Curly COMrades |
| 2025-11-03
⋅
Breached Company
⋅
When the Defenders Become the Attackers: Cybersecurity Experts Indicted for BlackCat Ransomware Operations BlackCat BlackCat |
| 2025-10-31
⋅
Expel
⋅
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates Broomstick |
| 2025-10-30
⋅
CybelAngel
⋅
Is RuskiNet the Next Big Russian Hacktivist Group RuskiNet |
| 2025-10-29
⋅
Palo Alto Networks Unit 42
⋅
Suspected Nation-State Threat Actor Uses New Airstalk Malware in a Supply Chain Attack Airstalk CL-STA-1009 |
| 2025-10-29
⋅
Qianxin
⋅
Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed PolarEdge |
| 2025-10-27
⋅
Trend Micro
⋅
Active Water Saci Campaign Spreading Via WhatsApp Features Multi-Vector Persistence and Sophisticated C&C Water Saci |
| 2025-10-27
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 2) JADESNOW |
| 2025-10-27
⋅
Kaspersky
⋅
Mem3nt0 mori – The Hacking Team is back! Dante |
| 2025-10-22
⋅
Multilateral Sanctions Monitoring Team
⋅
The DPRK's Violation and Evasion of UN Sanctions through Cyber and Information Technology Worker Activities |
| 2025-10-22
⋅
Trend Micro
⋅
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns Cobalt Strike DracuLoader ShadowPad Earth Naga |
| 2025-10-20
⋅
Darktrace
⋅
Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion SNAPPYBEE |
| 2025-10-20
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1) JADESNOW |
| 2025-10-19
⋅
Github (cocomelonc)
⋅
Malware development trick 52: steal data via legit Slack API. Simple C example |
| 2025-10-19
⋅
⋅
CNCERT
⋅
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks DanderSpritz |
| 2025-10-18
⋅
Twitter (@ThreatrayLabs)
⋅
Tweet on Kimsuky activity with loaders delivering HttpSpy and HttpTroy NikiTeaR |