Click here to download all references as Bib-File.•
| 2025-12-15
⋅
StrikeReady
⋅
Russian APT actor phishes the Baltics and the Balkans |
| 2025-12-15
⋅
Amazon
⋅
Amazon Threat Intelligence identifies Russian cyber threat group targeting Western critical infrastructure |
| 2025-12-15
⋅
Bleeping Computer
⋅
French Interior Ministry confirms cyberattack on email servers |
| 2025-12-12
⋅
⋅
Tagesschau
⋅
German government summons Russian ambassador |
| 2025-12-11
⋅
Trend Micro
⋅
SHADOW-VOID-042 Targets Multiple Industries with Void Rabisu-like Tactics ROMCOM RAT |
| 2025-12-11
⋅
Malwarebytes
⋅
Another Chrome zero-day under attack: update now |
| 2025-12-10
⋅
SpyCloud
⋅
Analyzing the Impact of the Operation Endgame Takedown on Rhadamanthys & the MaaS Ecosystem Rhadamanthys |
| 2025-12-10
⋅
The Record
⋅
DOJ, CISA warn of Russia-linked attacks targeting meat processing plants, nuclear regulatory entities and other critical infrastructure |
| 2025-12-10
⋅
Check Point Research
⋅
Cracking ValleyRAT: From Builder Secrets to Kernel Rootkits ValleyRAT |
| 2025-12-10
⋅
Trend Micro
⋅
CVE-2025-55182: React2Shell Analysis, Proof-of-Concept Chaos, and In-the-Wild Exploitation |
| 2025-12-10
⋅
LinkedIn (Idan Tarab)
⋅
Lifting the Shadow: APT-C-35’s Living Web Footprint |
| 2025-12-10
⋅
zimperium
⋅
Total Takeover: DroidLock Hijacks Your Device DroidLock |
| 2025-12-10
⋅
Netresec
⋅
Latrodectus BackConnect IcedID Keyhole Latrodectus |
| 2025-12-09
⋅
CISA
⋅
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Environmental Protection Agency
⋅
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious PNG Files |
| 2025-12-09
⋅
Reverse The Malware
⋅
Debunking a Malware Technique That Bypasses Binwalk Using dd |
| 2025-12-09
⋅
BlackPoint
⋅
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery CASTLELOADER |