Click here to download all references as Bib-File.•
| 2025-08-12
⋅
Bitdefender
⋅
Curly COMrades: A New Threat Actor Targeting Geopolitical Hotbeds Victor Vrabie RMS Curly COMrades |
| 2025-08-12
⋅
The New York Times
⋅
Russia Is Suspected to Be Behind Breach of Federal Court Filing System |
| 2025-08-12
⋅
bluecyber
⋅
Analysis of a ClickFix malware attack Vidar |
| 2025-08-10
⋅
DEFCON 33
⋅
Blurred Lines of Cyber Threat Attribution: The Evolving Tactics of North Korean Cyber Threat Actors |
| 2025-08-10
⋅
cocomelonc
⋅
MacOS hacking part 8: dlopen() code loading + finding target PIDs. Simple C (Intel, ARM) examples |
| 2025-08-08
⋅
Koi Security
⋅
GreedyBear: 650 Attack Tools, One Coordinated Campaign GreedyBear |
| 2025-08-05
⋅
Defentive
⋅
Lost in Translation: Threat Actors Use SEO Poisoning and Fake DeepL Sites to Distribute Gh0st RAT Ghost RAT |
| 2025-08-03
⋅
Reverse The Malware
⋅
One Click and You're Caught: HoneyFiles in Action |
| 2025-08-02
⋅
cocomelonc
⋅
MacOS hacking part 7: Minimal Linux-style shellcode on macOS (Intel). Simple NASM (Intel) and C examples |
| 2025-08-02
⋅
Reverse The Malware
⋅
Analysis of a Facebook Phishing Page |
| 2025-08-01
⋅
Nextron Systems
⋅
Plague: A Newly Discovered PAM-Based Backdoor for Linux Plague |
| 2025-07-31
⋅
Reverse The Malware
⋅
SysTracer: Another Suite for Digital Forensics and Incident Response |
| 2025-07-31
⋅
Reverse The Malware
⋅
ArtiFast Forensics Artifacts Investigation - ShellBags |
| 2025-07-30
⋅
cocomelonc
⋅
Mobile malware development trick 2. Abuse Telegram Bot API: Contacts. Simple Android (Java/Kotlin) stealer example. |
| 2025-07-30
⋅
GBHackers on Security
⋅
Lazarus Group enhances malware delivery by using new techniques OtterCookie |
| 2025-07-29
⋅
Foresiet
⋅
AURA Stealer: A Crude Clone of LummaC2 – Technical Analysis and Threat Breakdown Aura Stealer |
| 2025-07-28
⋅
Kyiv Independent
⋅
Hacker group claims responsibility for cyberattack on Russia's Aeroflot |
| 2025-07-27
⋅
Bleeping Computer
⋅
Scattered Spider is running a VMware ESXi hacking spree |
| 2025-07-26
⋅
Reverse The Malware
⋅
User History Artifact : Practical Gathering of Artifacts |
| 2025-07-26
⋅
Reverse The Malware
⋅
Forensic Artifacts for User Windows History Activity |