Click here to download all references as Bib-File.•
| 2025-12-09
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious PNG Files |
| 2025-12-09
⋅
Reverse The Malware
⋅
Debunking a Malware Technique That Bypasses Binwalk Using dd |
| 2025-12-09
⋅
BlackPoint
⋅
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery CASTLELOADER |
| 2025-12-09
⋅
Huntress Labs
⋅
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok AMOS |
| 2025-12-08
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very (Very) Chainful Process (Part 4) JADESNOW |
| 2025-12-08
⋅
sysdig
⋅
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks EtherRAT |
| 2025-12-08
⋅
Kroll
⋅
New AMOS Infection Vector Highlights Risks around AI Adoption AMOS |
| 2025-12-08
⋅
Trend Micro
⋅
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows GhostPenguin |
| 2025-12-08
⋅
Swisscom B2B CSIRT
⋅
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5 Amadey |
| 2025-12-07
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious BMP Files |
| 2025-12-05
⋅
Sophos
⋅
Sharpening the knife: GOLD BLADE’s strategic evolution Earth Kapre |
| 2025-12-04
⋅
Controlware
⋅
Beyond Potentially Unwanted Apps TamperedChef |
| 2025-12-04
⋅
Amazon
⋅
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) |
| 2025-12-04
⋅
Aryaka Networks
⋅
Scam in the Cloud How Fraudsters Exploit Google Cloud Storage (GCS) for Deceptive Campaigns |
| 2025-12-04
⋅
CrowdStrike
⋅
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary BRICKSTORM WARP PANDA |
| 2025-12-04
⋅
CISA
⋅
Malware Analysis Report (MAR) BRICKSTORM Backdoor BRICKSTORM |
| 2025-12-03
⋅
Hunt.io
⋅
Malicious VSCode Extension Launches Multi-Stage Attack Chain with Anivia Loader and OctoRAT OctoRAT |
| 2025-12-02
⋅
Github (cocomelonc)
⋅
HVCK magazine - issue 1: How to “hack” your Epson printer |
| 2025-12-02
⋅
ANY.RUN
⋅
Salty2FA & Tycoon2FA Hybrid: A New Phishing Threat to Enterprises Storm-1747 |
| 2025-12-02
⋅
Trend Micro
⋅
Unraveling Water Saci's New Multi-Format, AI-Enhanced Attacks Propagated via WhatsApp Water Saci |