Click here to download all references as Bib-File.•
| 2025-11-25
⋅
⋅
kienmanowar Blog
⋅
[Quick Analysis] Phishing Campaign Fake Tax Authorities to Distribute Malicious Codes VIP Keylogger |
| 2025-11-24
⋅
⋅
ISH Tecnologia
⋅
Analysis of the WhatsWorm Campaign leading to the implementation of the Eternity Stealer. |
| 2025-11-22
⋅
Synaptic Security
⋅
Inside Gamaredon 2025: Zero-Click Espionage at Scale PteroGraphin Pteranodon |
| 2025-11-22
⋅
LinkedIn (Idan Tarab)
⋅
India‑Aligned "Dropping Elephant" Pushes a New Stealth Marshalled‑Python Backdoor via MSBuild Dropper in Observed Activity Targeting Pakistan’s Defense Sector |
| 2025-11-21
⋅
K7 Security
⋅
Brazilian Campaign: Spreading the Malware via WhatsApp |
| 2025-11-20
⋅
Validin
⋅
Inside DPRK’s Fake Job Platform Targeting U.S. AI Talent |
| 2025-11-20
⋅
Google
⋅
Beyond the Watering Hole: APT24's Pivot to Multi-Vector Attacks BADAUDIO Cobalt Strike |
| 2025-11-20
⋅
Orange Cyberdefense
⋅
A Pain in the Mist: Navigating Operation DreamJob’s arsenal BURNBOOK MISTPEN |
| 2025-11-20
⋅
ThreatFabric
⋅
Sturnus: Mobile Banking Malware bypassing WhatsApp, Telegram and Signal Encryption Sturnus |
| 2025-11-19
⋅
NetAskari Substack
⋅
Critical strike: China's hacking training grounds (PART 1) |
| 2025-11-19
⋅
Natto Thoughts
⋅
China’s Cybersecurity Companies Advancing Offensive Cyber Capabilities Through Attack-Defense Labs |
| 2025-11-19
⋅
Amazon
⋅
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare |
| 2025-11-19
⋅
Spamhaus
⋅
The anatomy of bulletproof hosting – past, present, future |
| 2025-11-19
⋅
SecurityScorecard
⋅
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign |
| 2025-11-19
⋅
ESET Research
⋅
PlushDaemon compromises network devices for adversary-in-the-middle attacks EdgeStepper LittleDaemon |
| 2025-11-18
⋅
Oligo
⋅
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet IronErn440 |
| 2025-11-18
⋅
DataBreaches.net
⋅
From bad to worse: Doctor Alliance hacked again by same threat actor (2) Kazu |
| 2025-11-18
⋅
⋅
Cert-UA
⋅
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329) GAMYBEAR UAC-0241 |
| 2025-11-17
⋅
KELA
⋅
ByteToBreach: A Deep Dive into a Persistent Data Leak Operator ByteToBreach |
| 2025-11-17
⋅
moldovalive
⋅
War in the shadows of servers: how a Russian company could have organized an attack against Stark Industries from Moldova |