Click here to download all references as Bib-File.•
| 2025-07-18
⋅
GOV.UK
⋅
UK sanctions Russian spies at the heart of Putin’s malicious regime |
| 2025-07-18
⋅
Kyiv Independent
⋅
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says |
| 2025-07-18
⋅
The Record
⋅
UK sanctions Russian cyber spies accused of facilitating murders WhisperGate |
| 2025-07-17
⋅
NJCCIC
⋅
ClickFix Leading to MonsterV2 Infostealer MonsterV2 |
| 2025-07-17
⋅
⋅
Cert-UA
⋅
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039) LAMEHUG |
| 2025-07-17
⋅
National Police Agency (Japan)
⋅
Phobos/8Base Decryption Tool 8Base Phobos |
| 2025-07-16
⋅
Seqrite
⋅
UNG0002: Regional Threat Operations Tracked Across Multiple Asian Jurisdictions Shadow RAT |
| 2025-07-16
⋅
PRODAFT
⋅
LARVA-208’s New Campaign Targets Web3 Developers SilentPrism Fickle Stealer |
| 2025-07-16
⋅
cocomelonc
⋅
Malware and cryptography 43 - encrypt/decrypt payload via Mars cipher. Simple C example. |
| 2025-07-16
⋅
Reverse The Malware
⋅
Analysis Fake reCAPTCHA ( Powershell Stage ) |
| 2025-07-16
⋅
Reverse The Malware
⋅
Analysis Malicious reCAPTCHA |
| 2025-07-16
⋅
Reverse The Malware
⋅
Analysis CryptoMiner Sample ( Script Based ) |
| 2025-07-16
⋅
Shindan
⋅
Crocodilus - A deep dive into its structure and capabilities Crocodilus |
| 2025-07-16
⋅
Proofpoint
⋅
Phish and Chips: China-Aligned Espionage Actors Ramp Up Taiwan Semiconductor Industry Targeting Cobalt Strike Voldemort UNK_DropPitch UNK_FistBump UNK_SparkyCarp |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious HTA Dropper . |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Second Stage of Double Encoded Malicious Powershell |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Double Encoded Malicious Powershell |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious Powershell ( Part 4 ) |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 3 ) |
| 2025-07-15
⋅
Reverse The Malware
⋅
Analysis Malicious JAR ( Part 2 ) |