Click here to download all references as Bib-File.•
2025-03-31
⋅
Zscaler
⋅
Analyzing New HijackLoader Evasion Tactics HijackLoader |
2025-03-31
⋅
Sekoia
⋅
From Contagious to ClickFake Interview: Lazarus leveraging the ClickFix tactic FrostyFerret GolangGhost GolangGhost |
2025-03-28
⋅
Trend Micro
⋅
A Deep Dive into Water Gamayun’s Arsenal and Infrastructure DarkWisp SilentPrism Kematian Stealer Rhadamanthys Stealc Water Gamayun |
2025-03-28
⋅
Cisco Talos
⋅
Gamaredon campaign abuses LNK files to distribute Remcos backdoor Remcos |
2025-03-28
⋅
cyble
⋅
TsarBot: A New Android Banking Trojan Targeting Over 750 Banking, Finance, and Cryptocurrency Applications TsarBot |
2025-03-28
⋅
ThreatFabric
⋅
Exposing Crocodilus: New Device Takeover Malware Targeting Android Devices Crocodilus |
2025-03-28
⋅
SUCURI
⋅
Hidden Malware Strikes Again: Mu-Plugins Under Attack |
2025-03-28
⋅
Intrinsec
⋅
From espionage to PsyOps: Tracking operations and bulletproof providers of UACs in 2025 sLoad NetSupportManager RAT Remcos SmokeLoader |
2025-03-26
⋅
eSentire
⋅
The Long and Short(cut) of It: KoiLoader Analysis Koi Loader |
2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
2025-03-25
⋅
GoDaddy
⋅
Inside DollyWay’s C2 Infrastructure: Traffic Direction Systems and the LosPollos Connection DollyWay |
2025-03-25
⋅
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads |
2025-03-25
⋅
IBM X-Force
⋅
IBM X-Force discovers new Sheriff Backdoor used to target Ukraine Deputy Sheriff |
2025-03-25
⋅
JPCERT/CC
⋅
Tempted to Classifying APT Actors: Practical Challenges of Attribution in the Case of Lazarus’s Subgroup |
2025-03-25
⋅
DomainTools
⋅
Phishing Campaign Targets Defense and Aerospace Firms Linked to Ukraine Conflict |
2025-03-25
⋅
Kaspersky Labs
⋅
Operation ForumTroll: APT attack with Google Chrome zero-day exploit chain Operation ForumTroll |
2025-03-25
⋅
SpyCloud
⋅
On the Hunt for Ghost(Socks) GhostSocks |
2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
2025-03-22
⋅
Trend Micro
⋅
Back to Business: Lumma Stealer Returns with Stealthier Methods Lumma Stealer |
2025-03-19
⋅
cocomelonc
⋅
MD MZ Book: Russian translation |