Click here to download all references as Bib-File.•
2025-02-27
⋅
SC Media
⋅
Over 600 organizations subjected to global EncryptHub attacks Larva-208 |
2025-02-27
⋅
AhnLab
⋅
Phishing Email Attacks by the Larva-24005 Group Targeting Japan Larva-24005 |
2025-02-27
⋅
Github (knight0x07)
⋅
NailaoLoader: Hiding Execution Flow via Patching NailaoLocker |
2025-02-27
⋅
Palo Alto Networks Unit 42
⋅
Squidoor: Suspected Chinese Threat Actor’s Backdoor Targets Global Organizations FINALDRAFT FINALDRAFT REF7707 |
2025-02-27
⋅
Check Point Research
⋅
Modern Approach to Attributing Hacktivist Groups |
2025-02-27
⋅
WAR ON THE ROCKS
⋅
The Rise of the Fake Tech Workforce: State-Sponsored Infiltration of U.S. Technical Supply Chains |
2025-02-27
⋅
Microsoft
⋅
Disrupting a global cybercrime network abusing generative AI Storm-2139 |
2025-02-27
⋅
Cyber Geeks
⋅
Russian campaign targeting Romanian WhatsApp numbers |
2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey Fog |
2025-02-26
⋅
Ontinue
⋅
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations Black Basta Black Basta |
2025-02-26
⋅
FBI
⋅
Alert Number: I-022625-PSA - North Korea Responsible for $1.5 Billion Bybit Hack |
2025-02-26
⋅
POLITICO
⋅
Chinese hackers siphoned off Belgian state security emails, report says |
2025-02-26
⋅
Medium extensiontotal
⋅
A Wolf in Dark Mode: The Malicious VS Code Theme That Fooled Millions |
2025-02-25
⋅
PolarEdge: Unveiling an uncovered ORB network PolarEdge |
2025-02-25
⋅
Sentinel LABS
⋅
Ghostwriter | New Campaign Targets Ukrainian Government and Belarusian Opposition |
2025-02-24
⋅
Palo Alto Networks Unit 42
⋅
Auto-Color: An Emerging and Evasive Linux Backdoor |
2025-02-24
⋅
EUR-Lex
⋅
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine |
2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
2025-02-24
⋅
cocomelonc
⋅
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example. OceanLotus DuQu StegoLoader |
2025-02-24
⋅
K7 Security
⋅
LCRYX Ransomware: How a VB Ransomware Locks Your System LCRYX |