Click here to download all references as Bib-File.•
2025-06-20
⋅
K7 Security
⋅
SpyMax SpyMax |
2025-06-20
⋅
Field Effect
⋅
Zoom & doom: BlueNoroff call opens the door |
2025-06-20
⋅
Validin
⋅
Zooming through BlueNoroff Indicators with Validin |
2025-06-20
⋅
Twitter (@threatintel)
⋅
Tweet about wiper deployed against Albania by Druidfly |
2025-06-20
⋅
Github (VenzoV)
⋅
Analysis of Amatera Stealer v1 (Test build) Amatera |
2025-06-19
⋅
Hunt.io
⋅
Cobalt Strike Operators Leverage PowerShell Loaders Across Chinese, Russian, and Global Infrastructure Cobalt Strike |
2025-06-19
⋅
Government of Canada
⋅
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign |
2025-06-19
⋅
cocomelonc
⋅
MacOS hacking part 2: classic injection trick into macOS applications. Simple C example |
2025-06-18
⋅
Securonix
⋅
Analyzing SERPENTINE#CLOUD: Threat Actors Abuse Cloudflare Tunnels to Infect Systems with Stealthy Python-Based Malware |
2025-06-18
⋅
Seqrite
⋅
Masslogger Fileless Variant – Spreads via .VBE, Hides in Registry MASS Logger |
2025-06-18
⋅
Cisco Talos
⋅
Famous Chollima deploying Python version of GolangGhost RAT GolangGhost PylangGhost GolangGhost |
2025-06-18
⋅
Check Point Research
⋅
Fake Minecraft mods distributed by the Stargazers Ghost Network to steal gamers’ data |
2025-06-18
⋅
Elastic
⋅
A Wretch Client: From ClickFix deception to information stealer deployment HijackLoader Lumma Stealer SectopRAT |
2025-06-18
⋅
Huntress Labs
⋅
Feeling Blue(Noroff): Inside a Sophisticated DPRK Web3 Intrusion |
2025-06-18
⋅
PRODAFT
⋅
AntiDot Antidot |
2025-06-17
⋅
Trend Micro
⋅
Critical Langflow Vulnerability (CVE-2025-3248) Actively Exploited to Deliver Flodrix Botnet Flodrix |
2025-06-17
⋅
Palo Alto Networks Unit 42
⋅
Exploring a New KimJongRAT Stealer Variant and Its PowerShell Implementation KimJongRat |
2025-06-17
⋅
DARKReading
⋅
Operation Endgame: Do Takedowns and Arrests Matter? BumbleBee Emotet Pikabot SmokeLoader TrickBot |
2025-06-16
⋅
Glueck Kanja
⋅
Inside Akira Stealer: A full technical analysis of a modular stealer Akira Stealer |
2025-06-16
⋅
Proofpoint
⋅
Amatera Stealer: Rebranded ACR Stealer With Improved Evasion, Sophistication ACR Stealer Amatera |