Click here to download all references as Bib-File.•
| 2025-10-01
⋅
Chainanalysis
⋅
DPRK IT Workers: Inside North Korea’s Crypto Laundering Network |
| 2025-10-01
⋅
SpyCloud
⋅
Bifrost Burned: Dissecting Asgard Protector’s Defenses Lumma Stealer |
| 2025-10-01
⋅
Checkpoint
⋅
Rhadamanthys 0.9.x – walk through the updates Rhadamanthys |
| 2025-09-30
⋅
kuxhagra
⋅
that one time i got hacked: a security incident breakdown JADESNOW |
| 2025-09-30
⋅
Bloomberg
⋅
China Hackers Breached Foreign Ministers' Emails, Palo Alto Says |
| 2025-09-30
⋅
Google
⋅
Cybercrime Observations from the Frontlines: UNC6040 Proactive Hardening Recommendations |
| 2025-09-30
⋅
CIP
⋅
Russian Cyber Operations WRECKSTEEL HOMESTEEL Amatera GIFTEDCROOK StrelaStealer |
| 2025-09-30
⋅
Infoblox
⋅
Detour Dog: DNS Malware Powers Strela Stealer Campaigns StrelaStealer |
| 2025-09-30
⋅
Github (KittenBusters)
⋅
KittenBusters: CharmingKitten BellaCiao |
| 2025-09-30
⋅
K7 Security
⋅
PatchWork APT |
| 2025-09-30
⋅
Palo Alto Networks Unit 42
⋅
Phantom Taurus: A New Chinese Nexus APT and the Discovery of the NET-STAR Malware Suite NET-STAR |
| 2025-09-30
⋅
Elastic
⋅
WARMCOOKIE One Year Later: New Features and Fresh Insights WarmCookie |
| 2025-09-30
⋅
Synthient
⋅
GhostSocks: From Initial Access to Residential Proxy GhostSocks Lumma Stealer |
| 2025-09-29
⋅
The DFIR Report
⋅
From a Single Click: How Lunar Spider Enabled a Near Two-Month Intrusion Brute Ratel C4 Cobalt Strike Latrodectus |
| 2025-09-29
⋅
Shindan
⋅
DHCSpy - Discovering the Iranian APT MuddyWater DCHSpy |
| 2025-09-28
⋅
Malasada Tech
⋅
Oyster Malware Delivery via Teams Fake App Broomstick |
| 2025-09-26
⋅
abuse.ch
⋅
Twitter Post Kamasers |
| 2025-09-26
⋅
Arctic Wolf
⋅
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less Akira Akira |
| 2025-09-26
⋅
BlackPoint
⋅
Malicious Teams Installers Drop Oyster Malware Broomstick |
| 2025-09-25
⋅
Aryaka Networks
⋅
BatShadow: Vietnamese Threat Actor Expands Its Digital Operations Vampire Bot BatShadow |