Click here to download all references as Bib-File.•
2025-03-05
⋅
Microsoft
⋅
Silk Typhoon targeting IT supply chain |
2025-03-04
⋅
K7 Security
⋅
Tracking Emmenhtal Emmenhtal |
2025-03-04
⋅
Medium (A-poc)
⋅
Black Basta Leak Analysis Black Basta Black Basta |
2025-03-04
⋅
c/side
⋅
Thousands of websites hit by four backdoors in 3rd party JavaScript attack |
2025-03-04
⋅
⋅
Genians
⋅
Analysis of Kimsuky Group association with emergency martial arts-themed APT attack Quasar RAT |
2025-03-04
⋅
Nisos
⋅
Likely DPRK Network Backstops on GitHub, Targets Companies Globally |
2025-03-04
⋅
Department of Justice
⋅
10 Chinese Nationals Charged With Large-Scale Hacking Of U.S. And International Victims On Behalf Of The Chinese Government |
2025-03-04
⋅
LinkedIn (Idan Tarab)
⋅
Unmasking New Infrastructure: UAC-0184’s Espionage Activities |
2025-03-04
⋅
Secureworks
⋅
GOLD REBELLION GOLD REBELLION |
2025-03-03
⋅
Trend Micro
⋅
Black Basta and Cactus Ransomware Groups Add BackConnect Malware to Their Arsenal Black Basta Black Basta Cactus ReedBed |
2025-03-02
⋅
ropgadget.com
⋅
Pivoting on Black Basta's (leaked) Infrastructure Black Basta Black Basta |
2025-03-01
⋅
⋅
LeMagIT
⋅
Ransomware : de REvil à Black Basta, que sait-on de Tramp ? Black Basta Black Basta |
2025-02-28
⋅
Intel 471
⋅
Black Basta exposed: A look at a cybercrime data leak Black Basta Black Basta |
2025-02-28
⋅
Greynoise
⋅
New DDoS Botnet Discovered: Over 30,000 Hacked Devices, Majority of Observed Activity Traced to Iran Mirai |
2025-02-28
⋅
Palo Alto Networks Unit 42
⋅
JavaGhost’s Persistent Phishing Attacks From the Cloud JavaGhost |
2025-02-28
⋅
KrebsOnSecurity
⋅
Notorious Malware, Spam Host “Prospero” Moves to Kaspersky Lab FAKEUPDATES GootLoader |
2025-02-28
⋅
CrowdStrike
⋅
2025 Global Threat Report GOLD REBELLION UNC4393 |
2025-02-27
⋅
Intrinsec
⋅
Doppelgänger: New disinformation campaigns spreading on social media through Russian networks |
2025-02-27
⋅
BushidoToken
⋅
BlackBasta Leaks: Lessons from the Ascension Health attack Black Basta |
2025-02-27
⋅
Hunt.io
⋅
Uncovering Joker’s C2 Network: How Hunt’s SSL History Exposed Its Infrastructure Joker |