Click here to download all references as Bib-File.•
| 2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey Fog |
| 2025-02-26
⋅
Ontinue
⋅
Inside BlackBasta: What Leaked Conversations Reveal About Their Ransomware Operations Black Basta Black Basta |
| 2025-02-26
⋅
FBI
⋅
Alert Number: I-022625-PSA - North Korea Responsible for $1.5 Billion Bybit Hack |
| 2025-02-26
⋅
POLITICO
⋅
Chinese hackers siphoned off Belgian state security emails, report says |
| 2025-02-24
⋅
Palo Alto Networks Unit 42
⋅
Auto-Color: An Emerging and Evasive Linux Backdoor |
| 2025-02-24
⋅
EUR-Lex
⋅
Council Implementing Regulation (EU) 2025/389 of 24 February 2025 implementing Regulation (EU) No 269/2014 concerning restrictive measures in respect of actions undermining or threatening the territorial integrity, sovereignty and independence of Ukraine |
| 2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
| 2025-02-24
⋅
cocomelonc
⋅
Malware development trick 45: hiding and extracting payload in PNGs (with cats). Simple C example. OceanLotus DuQu StegoLoader |
| 2025-02-23
⋅
The Guardian
⋅
Hackers steal $1.5bn from crypto exchange in ‘biggest digital heist ever’ |
| 2025-02-23
⋅
Github (albertzsigovits)
⋅
ToxicEye RAT config extraction and YARA signatures ToxicEye |
| 2025-02-21
⋅
The Record
⋅
Ukrainian hackers claim breach of Russian loan company linked to Putin’s ex-wife Cyber Alliance |
| 2025-02-21
⋅
SonicWall
⋅
Remcos RAT Targets Europe: New AMSI and ETW Evasion Tactics Uncovered Remcos |
| 2025-02-21
⋅
TRM Labs
⋅
TRM Links North Korea to Record $1.5 Billion Record Hack |
| 2025-02-20
⋅
Reliaquest
⋅
48 Minutes: How Fast Phishing Attacks Exploit Weaknesses ReedBed |
| 2025-02-20
⋅
Orange Cyberdefense
⋅
Meet NailaoLocker: a ransomware distributed in Europe by ShadowPad and PlugX backdoors NailaoLocker PlugX ShadowPad |
| 2025-02-20
⋅
Cyber Security News
⋅
APT-C-28 Group Launched New Cyber Attack With Fileless RokRat Malware RokRAT |
| 2025-02-20
⋅
Silent Push
⋅
Tweet on Tracking ValleyRAT Domains with ICP Licenses ValleyRAT |
| 2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
| 2025-02-15
⋅
Medium TRAC Labs
⋅
Don’t Ghost the SocGholish: GhostWeaver Backdoor FAKEUPDATES GhostWeaver |
| 2025-02-13
⋅
Securonix
⋅
Analyzing DEEP#DRIVE: North Korean Threat Actors Observed Exploiting Trusted Platforms for Targeted Attacks RandomQuery |