Click here to download all references as Bib-File.•
| 2025-10-31
⋅
Expel
⋅
Certified OysterLoader: Tracking Rhysida ransomware gang activity via code-signing certificates Broomstick |
| 2025-10-29
⋅
Qianxin
⋅
Smoking Gun Uncovered: RPX Relay at PolarEdge’s Core Exposed PolarEdge |
| 2025-10-27
⋅
Kaspersky
⋅
Mem3nt0 mori – The Hacking Team is back! Dante |
| 2025-10-22
⋅
Trend Micro
⋅
The Rise of Collaborative Tactics Among China-aligned Cyber Espionage Campaigns Cobalt Strike DracuLoader ShadowPad |
| 2025-10-20
⋅
Darktrace
⋅
Salty Much: Darktrace’s view on a recent Salt Typhoon intrusion SNAPPYBEE |
| 2025-10-20
⋅
Ransom-ISAC
⋅
Cross-Chain TxDataHiding Crypto Heist: A Very Chainful Process (Part 1) JADESNOW |
| 2025-10-19
⋅
⋅
CNCERT
⋅
Technical Analysis Report on National Timing Center's National Security Agency Cyberattacks DanderSpritz |
| 2025-10-18
⋅
Koi Security
⋅
GlassWorm: First Self-Propagating Worm Using Invisible Code Hits OpenVSX Marketplace GlassWorm |
| 2025-10-16
⋅
Trendmicro
⋅
Shifts in the Underground: The Impact of Water Kurita’s (Lumma Stealer) Doxxing Lumma Stealer |
| 2025-10-16
⋅
Hunt.io
⋅
Odyssey Stealer and AMOS Campaign Targets macOS Developers Through Fake Tools AMOS |
| 2025-10-16
⋅
Swisscom B2B CSIRT
⋅
Swisscom TDR Intel Brief - Acreed: On-Chain C2 Evolution ACR Stealer |
| 2025-10-16
⋅
Mandiant
⋅
DPRK Adopts EtherHiding: Nation-State Malware Hiding on Blockchains JADESNOW |
| 2025-10-15
⋅
Symantec
⋅
Jewelbug: Chinese APT Group Widens Reach to Russia |
| 2025-10-15
⋅
David Dodda
⋅
How I Almost Got Hacked By A 'Job Interview' OtterCookie |
| 2025-10-15
⋅
Trend Micro
⋅
Operation Zero Disco: Attackers Exploit Cisco SNMP Vulnerability to Deploy Rootkits |
| 2025-10-14
⋅
Synacktiv
⋅
LinkPro: eBPF rootkit analysis LinkPro |
| 2025-10-14
⋅
⋅
Synacktiv
⋅
LinkPro: analysis of an eBPF rootkit LinkPro vGet |
| 2025-10-14
⋅
Gatewatcher
⋅
Data Breach: the operations of "Charming Kitten" revealed |
| 2025-10-13
⋅
⋅
Logpresso
⋅
[Threat Analysis] Lazarus Group Analyzes Malware for Windows and MacOS |
| 2025-10-13
⋅
Proofpoint
⋅
When the monster bytes: tracking TA585 and its arsenal MonsterV2 |