Click here to download all references as Bib-File.•
| 2025-07-01
⋅
ANSSI
⋅
Houken: Seeking a Path by Living on The Edge With Zero-Days GOREVERSE |
| 2025-07-01
⋅
ANSSI
⋅
Houken seeking a path by living on the edge with zero-days GOREshell |
| 2025-06-30
⋅
Microsoft
⋅
Jasper Sleet: North Korean remote IT workers’ evolving tactics to infiltrate organizations |
| 2025-06-30
⋅
ICC
⋅
ICC detects and contains new sophisticated cyber security incident |
| 2025-06-29
⋅
Medium Sapir Twig
⋅
Inside DarkGate: In-Depth Technical Analysis of the Malware-as-a-Service Threat DarkGate |
| 2025-06-27
⋅
axios
⋅
Prolific cybercriminal group now targeting aviation, transportation companies |
| 2025-06-26
⋅
Arctic Wolf
⋅
GIFTEDCROOK’s Strategic Pivot: From Browser Stealer to Data Exfiltration Platform During Critical Ukraine Negotiations GIFTEDCROOK |
| 2025-06-24
⋅
Bridewell
⋅
2025 Cyber Threat Intelligence Report AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver |
| 2025-06-23
⋅
cegeka
⋅
StealeriumPy: A Stealerium variant distributed through ClickFix Stealerium |
| 2025-06-23
⋅
Gdata
⋅
ConnectUnwise: Threat actors abuse ConnectWise as builder for signed malware EvilConwi |
| 2025-06-23
⋅
Rushter
⋅
Threat Hunting Introduction: Cobalt Strike Cobalt Strike |
| 2025-06-23
⋅
Darkatlas
⋅
Bluenoroff (APT38) Live Infrastructure Hunting |
| 2025-06-21
⋅
⋅
Cert-UA
⋅
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT BEARDSHELL GRUNT SLIMAGENT |
| 2025-06-20
⋅
Validin
⋅
Zooming through BlueNoroff Indicators with Validin |
| 2025-06-20
⋅
Twitter (@threatintel)
⋅
Tweet about wiper deployed against Albania by Druidfly |
| 2025-06-20
⋅
Github (VenzoV)
⋅
Analysis of Amatera Stealer v1 (Test build) Amatera |
| 2025-06-19
⋅
Hunt.io
⋅
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure Cobalt Strike |
| 2025-06-19
⋅
Government of Canada
⋅
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign |
| 2025-06-19
⋅
cocomelonc
⋅
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example |
| 2025-06-18
⋅
Securonix
⋅
Analyzing SERPENTINE#CLOUD: Threat Actors Abuse Cloudflare Tunnels to Infect Systems with Stealthy Python-Based Malware |