Click here to download all references as Bib-File.•
| 2025-10-18
⋅
Koi Security
⋅
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace GlassWorm |
| 2025-10-16
⋅
Qualys
⋅
F5 BIG-IP Source Code Leaked in State-Linked Cyberattack (BRICKSTORM Malware) BRICKSTORM |
| 2025-10-16
⋅
Trendmicro
⋅
Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing Lumma Stealer Water Kurita |
| 2025-10-16
⋅
Hunt.io
⋅
Odyssey Stealer and AMOS Campaign Targets macOS Developers Through Fake Tools AMOS |
| 2025-10-16
⋅
Swisscom B2B CSIRT
⋅
Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution ACR Stealer |
| 2025-10-16
⋅
Mandiant
⋅
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains JADESNOW UNC5342 |
| 2025-10-15
⋅
Github (cocomelonc)
⋅
MacOS hacking part 12: reverse shell for ARM (M1). Simple Assembly (M1) example |
| 2025-10-15
⋅
Symantec
⋅
Jewelbug: Chinese APT Group Widens Reach to Russia REF7707 |
| 2025-10-15
⋅
David Dodda
⋅
How I Almost Got Hacked By A 'Job Interview' OtterCookie |
| 2025-10-15
⋅
Trend Micro
⋅
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits |
| 2025-10-14
⋅
Synacktiv
⋅
LinkPro: eBPF rootkit analysis LinkPro |
| 2025-10-14
⋅
⋅
Synacktiv
⋅
LinkPro: analysis of an eBPF rootkit LinkPro vGet |
| 2025-10-14
⋅
Gatewatcher
⋅
Data Breach: the operations of "Charming Kitten" revealed |
| 2025-10-13
⋅
⋅
Logpresso
⋅
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |
| 2025-10-10
⋅
Security Affairs
⋅
Ukraine sees surge in AI-Powered cyberattacks by Russia-linked Threat Actors WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227 |
| 2025-10-10
⋅
ReversingLabs
⋅
Shai-hulud npm attack: What you need to know Shai-Hulud |
| 2025-10-10
⋅
Socket
⋅
North Korea’s Contagious Interview Campaign Escalates: 338 Malicious npm Packages, 50,000 Downloads BeaverTail InvisibleFerret |
| 2025-10-09
⋅
Github (cocomelonc)
⋅
Linux hacking part 7: Linux sysinfo stealer: Telegram Bot API. Simple C example |
| 2025-10-09
⋅
Microsoft
⋅
Investigating targeted “payroll pirate” attacks affecting US universities Storm-2657 |