Click here to download all references as Bib-File.•
2025-04-12
⋅
CyberSecurity88
⋅
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack MORH4x |
2025-04-11
⋅
DeXpose
⋅
Flesh Stealer: A Report on Multivector Data Theft Flesh Stealer |
2025-04-11
⋅
Bitso Quetzal Team
⋅
Interview with the Chollima BeaverTail OtterCookie InvisibleFerret |
2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
2025-04-10
⋅
cocomelonc
⋅
Malware and cryptography 41 - encrypt/decrypt payload via TEA. Simple Nim example. |
2025-04-10
⋅
Kaspersky Labs
⋅
GOFFEE continues to attack organizations in Russia Owowa GOFFEE |
2025-04-10
⋅
Symantec
⋅
Shuckworm Targets Foreign Military Mission Based in Ukraine |
2025-04-10
⋅
Medium TRAC Labs
⋅
Autopsy of a Failed Stealer: StealC v2 Stealc |
2025-04-09
⋅
Beware! Fake ‘NextGen mParivahan’ Malware Returns with Enhanced Stealth and Data Theft |
2025-04-09
⋅
iVerify
⋅
Abusing Data in the Middle |
2025-04-09
⋅
Resecurity
⋅
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach Jabaroot |
2025-04-09
⋅
NCSC UK
⋅
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations badbazaar |
2025-04-09
⋅
NCSC UK
⋅
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors badbazaar |
2025-04-09
⋅
NCSC UK
⋅
NCSC and partners share guidance for communities at high risk of digital surveillance badbazaar |
2025-04-09
⋅
Europol
⋅
Operation Endgame follow-up leads to five detentions and interrogations as well as server takedowns SmokeLoader |
2025-04-08
⋅
Team Cymru
⋅
Inside DanaBot’s Infrastructure: In Support of Operation Endgame II DanaBot |
2025-04-08
⋅
Microsoft
⋅
Exploitation of CLFS zero-day leads to ransomware activity RansomEXX Storm-2460 |
2025-04-08
⋅
Trustwave
⋅
A deep Dive into the Leaked Black Basta Chat Logs Black Basta Black Basta |
2025-04-08
⋅
Seqrite
⋅
Goodbye HTA, Hello MSI: New TTPs and Clusters of an APT driven by Multi-Platform Attacks CurlBack RAT XenoRAT |
2025-04-08
⋅
Hunt.io
⋅
State-Sponsored Tactics: How Gamaredon and ShadowPad Operate and Rotate Their Infrastructure ShadowPad |