Click here to download all references as Bib-File.•
| 2025-11-19
⋅
Amazon
⋅
New Amazon Threat Intelligence findings: Nation-state actors bridging cyber and kinetic warfare |
| 2025-11-19
⋅
Spamhaus
⋅
The anatomy of bulletproof hosting – past, present, future |
| 2025-11-19
⋅
SecurityScorecard
⋅
Thousands of ASUS Routers Hijacked in Global Operation “WrtHug” in a Suspected China-Backed Campaign |
| 2025-11-19
⋅
ESET Research
⋅
PlushDaemon compromises network devices for adversary-in-the-middle attacks EdgeStepper LittleDaemon |
| 2025-11-18
⋅
Oligo
⋅
ShadowRay 2.0: Attackers Turn AI Against Itself in Global Campaign that Hijacks AI Into Self-Propagating Botnet IronErn440 |
| 2025-11-18
⋅
DataBreaches.net
⋅
From bad to worse: Doctor Alliance hacked again by same threat actor (2) Kazu |
| 2025-11-18
⋅
⋅
Cert-UA
⋅
Cyberattack against an educational institution in eastern Ukraine using the GAMYBEAR software tool (CERT-UA#18329) GAMYBEAR UAC-0241 |
| 2025-11-17
⋅
KELA
⋅
ByteToBreach: A Deep Dive into a Persistent Data Leak Operator ByteToBreach |
| 2025-11-17
⋅
moldovalive
⋅
War in the shadows of servers: how a Russian company could have organized an attack against Stark Industries from Moldova |
| 2025-11-17
⋅
The HIPAA Journal
⋅
Doctor Alliance Investigating 353 GB Data Theft Claim Kazu |
| 2025-11-17
⋅
AhnLab
⋅
NKNShell Malware Distributed via VPN Website Larva-24010 |
| 2025-11-17
⋅
0x0d4y
⋅
Nation-State Actor’s Arsenal: An In-Depth Look at Lazarus’ ScoringMathTea ScoringMathTea |
| 2025-11-15
⋅
Elastic
⋅
RONINGLOADER: DragonBreath’s New Path to PPL Abuse DragonBreath RONINGLOADER |
| 2025-11-14
⋅
Github (cocomelonc)
⋅
Linux hacking part 8: Linux password-protected bind shell. Simple NASM example |
| 2025-11-14
⋅
The Record
⋅
Multiple US citizens plead guilty to helping North Korean IT workers earn $2 million |
| 2025-11-13
⋅
Trend Micro
⋅
Increase in Lumma Stealer Activity Coincides with Use of Adaptive Browser Fingerprinting Tactics Lumma Stealer Water Kurita |
| 2025-11-13
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 3) JADESNOW |
| 2025-11-13
⋅
Politie NL
⋅
Again criminal infrastructure dismantled in international ransomware operation Rhadamanthys Venom RAT |
| 2025-11-13
⋅
NVISO Labs
⋅
Contagious Interview Actors Now Utilize JSON Storage Services for Malware Delivery BeaverTail OtterCookie InvisibleFerret Beavertail TsunamiKit |
| 2025-11-13
⋅
Anthropic
⋅
Disrupting the first reported AI-orchestrated cyber espionage campaign GTG-1002 |