Click here to download all references as Bib-File.•
| 2025-10-09
⋅
Red Canary
⋅
A taxonomy of Mac stealers: Distinguishing Atomic, Odyssey, and Poseidon AMOS Odyssey Stealer Poseidon Stealer |
| 2025-10-08
⋅
⋅
CIP
⋅
New cyber threats: who and how to attack enemy groups WRECKSTEEL HOMESTEEL GIFTEDCROOK UAC-0227 |
| 2025-10-07
⋅
Cybernews
⋅
Steam, Riot Games hit by disruptions: massive DDoS attack suspected Aisuru |
| 2025-10-06
⋅
Microsoft
⋅
Investigating active exploitation of CVE-2025-10035 GoAnywhere Managed File Transfer vulnerability Medusa Storm-1175 |
| 2025-10-06
⋅
BlackPoint
⋅
Malicious Node Package Deploys OtterCookie OtterCookie |
| 2025-10-03
⋅
Techzine
⋅
What we know so far about Red Hat’s GitLab instance breach Crimson Collective |
| 2025-10-02
⋅
Medium BI.ZONE
⋅
Cavalry Werewolf raids Russia’s public sector with trusted relationship attacks FoalShell StallionRAT YoroTrooper |
| 2025-10-02
⋅
Trellix
⋅
XWorm V6: Exploring Pivotal Plugins XWorm |
| 2025-10-02
⋅
Security Affairs
⋅
Cybercrime group claims to have breached Red Hat ‘s private GitHub repositories Crimson Collective |
| 2025-10-02
⋅
CyberSecurityNews
⋅
Red Hat Data Breach – Threat Actors Claim Breach of 28K Private GitHub Repositories Crimson Collective |
| 2025-10-01
⋅
NetScout
⋅
Keymous+ Threat Actor Profile Keymous+ |
| 2025-09-30
⋅
kuxhagra
⋅
that one time i got hacked: a security incident breakdown JADESNOW |
| 2025-09-30
⋅
Bloomberg
⋅
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says |
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-09-30
⋅
Synthient
⋅
GhostSocks: From Initial Access to Residential Proxy GhostSocks Lumma Stealer |
| 2025-09-26
⋅
BlackPoint
⋅
Malicious Teams Installers Drop Oyster Malware Broomstick |
| 2025-09-25
⋅
Aryaka Networks
⋅
BatShadow: Vietnamese Threat Actor Expands Its Digital Operations Vampire Bot BatShadow |
| 2025-09-25
⋅
Trend Micro
⋅
New LockBit 5.0 Targets Windows, Linux, ESXi LockBit LockBit |
| 2025-09-25
⋅
Koi Security
⋅
First Malicious MCP in the Wild: The Postmark Backdoor That's Stealing Your Emails |
| 2025-09-24
⋅
TEAMT5
⋅
Google Calendar As C2 Infrastructure: A China-Nexus Campaign With Stealthy Tactics TOUGHPROGRESS |