Click here to download all references as Bib-File.•
2025-06-09
⋅
Netresec
⋅
Detecting PureLogs traffic with CapLoader PureLogs Stealer |
2025-06-09
⋅
Zscaler
⋅
DanaBleed: DanaBot C2 Server Memory Leak Bug DanaBot |
2025-06-09
⋅
Kaspersky
⋅
Sleep with one eye open: how Librarian Ghouls steal data by night |
2025-06-09
⋅
Genians
⋅
Analysis of the Triple Combo Threat of the Kimsuky Group FlowerPower Appleseed BabyShark |
2025-06-06
⋅
Seqrite
⋅
Operation DRAGONCLONE: Chinese Telecommunication industry targeted via VELETRIX & VShell malware. VELETRIX Vshell |
2025-06-05
⋅
Reliaquest
⋅
Scattered Spider Targets Tech Companies for Help-Desk Exploitation |
2025-06-05
⋅
ESET Research
⋅
BladedFeline: Whispering in the dark Hawking RDAT Spereal Veaty |
2025-06-05
⋅
Cisco Talos
⋅
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine PathWiper |
2025-06-05
⋅
Mobile-Hacker
⋅
Analysis of Spyware That Helped to Compromise a Syrian Army from Within SpyMax |
2025-06-04
⋅
Threatray
⋅
The Bitter End: Unraveling Eight Years of Espionage Antics – Part Two AlmondRAT AlmondRAT Artra Downloader BDarkRAT Havoc KiwiStealer KugelBlitz MiyaRAT ORPCBackdoor WmRAT ZxxZ |
2025-06-04
⋅
Proofpoint
⋅
The Bitter End: Unraveling Eight Years of Espionage Antics—Part One Artra Downloader Havoc |
2025-06-03
⋅
cocomelonc
⋅
Linux hacking part 5: building a Linux keylogger. Simple C example |
2025-06-03
⋅
K7 Security
⋅
In-depth Analysis of a 2025 ViperSoftX Variant ViperSoftX |
2025-06-03
⋅
ANY.RUN
⋅
OtterCookie: Analysis of Lazarus Group Malware Targeting Finance and Tech Professionals BeaverTail OtterCookie InvisibleFerret |
2025-06-02
⋅
Aryaka Networks
⋅
Remcos on the Wire: Analyzing Network Artifacts and C2 Command Structures Remcos |
2025-05-31
⋅
Medium (@mvaks)
⋅
Crocodilus in the wild: Mapping the campaign in Poland Crocodilus |
2025-05-31
⋅
The Insider
⋅
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad |
2025-05-30
⋅
Censys
⋅
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign |
2025-05-30
⋅
Intrinsec
⋅
BtHoster: Identifying noisy networks emitting malicious traffic through masscan servers |
2025-05-29
⋅
cocomelonc
⋅
Malware and cryptography 42 - encrypt/decrypt payload via Speck cipher. Simple C example. |