Click here to download all references as Bib-File.•
2025-09-26
⋅
Arctic Wolf
⋅
Smash and Grab: Aggressive Akira Campaign Targets SonicWall VPNs, Deploys Ransomware in an Hour or Less Akira Akira |
2025-09-19
⋅
BlackPoint
⋅
KeyZero: A Custom PowerShell RAT |
2025-09-19
⋅
ESET Research
⋅
Gamaredon X Turla collab PteroGraphin |
2025-09-11
⋅
IBM X-Force
⋅
Hive0154, aka Mustang Panda, drops updated Toneshell backdoor and novel SnakeDisk USB worm PUBLOAD SnakeDisk TONESHELL Yokai |
2025-08-18
⋅
Trellix
⋅
A Comprehensive Analysis of HijackLoader and Its Infection Chain HijackLoader |
2025-08-12
⋅
bluecyber
⋅
Analysis of a ClickFix malware attack Vidar |
2025-08-11
⋅
cocomelonc
⋅
Malware development trick 49: abusing Azure DevOps REST API for covert data channels. Simple C examples. AllaKore |
2025-07-31
⋅
Reverse The Malware
⋅
Threat Intelligence visa ccTLD ( country code top-level domain ) |
2025-07-29
⋅
Foresiet
⋅
AURA Stealer: A Crude Clone of LummaC2 – Technical Analysis and Threat Breakdown Aura Stealer |
2025-07-07
⋅
Github (VenzoV)
⋅
Golang garbled executable from Amatera config Amatera |
2025-06-24
⋅
Trellix
⋅
OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure |
2025-06-19
⋅
Government of Canada
⋅
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign |
2025-05-29
⋅
Elastic
⋅
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns EDDIESTEALER |
2025-05-21
⋅
Trendmicro
⋅
TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead Stealc Vidar |
2025-05-07
⋅
FBI
⋅
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers TheMoon |
2025-04-30
⋅
Seqrite
⋅
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government Crimson RAT |
2025-04-29
⋅
Nextron Systems
⋅
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements” Cobalt Strike Nitrogen Loader |
2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
2025-04-16
⋅
SpyCloud
⋅
Exposed Credentials & Ransomware Operations: Using LLMs to Digest 200K Messages from the Black Basta Chats Black Basta Black Basta |
2025-04-08
⋅
Trustwave
⋅
A deep Dive into the Leaked Black Basta Chat Logs Black Basta Black Basta |