Click here to download all references as Bib-File.•
2025-05-01
⋅
Zscaler
⋅
I StealC You: Tracking the Rapid Changes To StealC Stealc |
2025-04-25
⋅
Twitter (@teamcymru_S2)
⋅
Tweet on North Korean Cyber Ops Leveraging Russian Infrastructure |
2025-04-16
⋅
IBM X-Force
⋅
IBM X-Force 2025 Threat Intelligence Index |
2025-04-11
⋅
Bitso Quetzal Team
⋅
Interview with the Chollima BeaverTail OtterCookie InvisibleFerret |
2025-04-11
⋅
Reliaquest
⋅
Threat Spotlight: Hijacked and Hidden: New Backdoor and Persistence Technique |
2025-04-10
⋅
Symantec
⋅
Shuckworm Targets Foreign Military Mission Based in Ukraine |
2025-04-03
⋅
ThreatMon
⋅
Ransomhub Group & New Betruger Backdoor Technical Malware Analysis Report |
2025-03-26
⋅
ThreatMon
⋅
Raton / Silly - Remote Access Trojan | Technical Malware Analysis Report AsyncRAT |
2025-03-24
⋅
SYGNIA
⋅
Weaver Ant, the Web Shell Whisperer: Tracking a Live China-nexus Operation CHINACHOPPER reGeorg |
2025-03-19
⋅
Natto Thoughts
⋅
Zhou Shuai: A Hacker’s Road to APT27 |
2025-03-16
⋅
SYGNIA
⋅
Bybit – What We Know So Far |
2025-03-13
⋅
Linkedin (ThreatMon)
⋅
Chrome DLL Manipulation Attack Exposed |
2025-03-11
⋅
ThreatMon
⋅
New Ermac Variant - Android Banking Trojan & Botnet ERMAC |
2025-03-07
⋅
Proofpoint
⋅
Remote Monitoring and Management (RMM) Tooling Increasingly an Attacker’s First Choice |
2025-02-26
⋅
ThreatMon
⋅
FOG Ransomware Attacks the Energy Sector in Turkey Fog |
2025-02-24
⋅
SecurityScorecard
⋅
Massive Botnet Targets M365 with Stealthy Password Spraying Attacks |
2025-02-20
⋅
Infrawatch
⋅
GhostSocks - Lumma's Partner In Proxy GhostSocks Lumma Stealer |
2025-02-19
⋅
Natto Thoughts
⋅
The Pangu Team—iOS Jailbreak and Vulnerability Research Giant: A Member of i-SOON’s Exploit-Sharing Network |
2025-02-18
⋅
Proofpoint
⋅
An Update on Fake Updates: Two New Actors, and New Mac Malware Marcher FAKEUPDATES FrigidStealer Lumma Stealer |
2025-02-13
⋅
Symantec
⋅
China-linked Espionage Tools Used in Ransomware Attacks PlugX |