Click here to download all references as Bib-File.•
2025-05-20
⋅
US Department of Defense
⋅
Russian GRU Targeting Western Logistics Entities and Technology Companies STEELHOOK MASEPIE Headlace |
2025-05-20
⋅
Europol
⋅
Europol and Microsoft disrupt world’s largest infostealer Lumma Lumma Stealer |
2025-05-20
⋅
European Council
⋅
Russian hybrid threats: EU lists further 21 individuals and 6 entities and introduces sectoral measures in response to destabilising activities against the EU, its member states and international partners |
2025-05-20
⋅
⋅
Kaspersky
⋅
https://securelist.ru/purerat-attacks-russian-organizations/112619/ PureLogs Stealer |
2025-05-20
⋅
Acronis
⋅
From banks to battalions: SideWinder’s attacks on South Asia’s public sector |
2025-05-19
⋅
The DFIR Report
⋅
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Mimic Ransomware MimiKatz |
2025-05-19
⋅
cyjax
⋅
A Sting on Bing: Bumblebee delivered through Bing SEO poisoning campaign BumbleBee |
2025-05-19
⋅
CSA
⋅
Reversing a Microsoft-Signed Rootkit: The Netfilter Driver NetfilterRootkit |
2025-05-19
⋅
GitHub - Adaptix-Framework//AdaptixC2 AdaptixC2 |
2025-05-17
⋅
Denwp Research
⋅
More_Eggs? A Venom Spider Backdoor Targeting HR More_eggs |
2025-05-16
⋅
AhnLab
⋅
DBatLoader (ModiLoader) Being Distributed to Turkish Users DBatLoader |
2025-05-16
⋅
Ransomware Roundup – VanHelsing VanHelsing |
2025-05-16
⋅
Gdata
⋅
Printer company provided infected software downloads for half a year SnipVex |
2025-05-15
⋅
ESET Research
⋅
Operation RoundPress SpyPress |
2025-05-15
⋅
Medium b.magnezi
⋅
Ave Maria Malware Analysis Ave Maria |
2025-05-14
⋅
Zscaler
⋅
Technical Analysis of TransferLoader TransferLoader |
2025-05-13
⋅
Trend Micro
⋅
Earth Ammit Disrupts Drone Supply Chains Through Coordinated Multi-Wave Attacks in Taiwan |
2025-05-13
⋅
Proofpoint
⋅
TA406 Pivots to the Front |
2025-05-13
⋅
EclecticIQ
⋅
China-Nexus Nation State Actors Exploit SAP NetWeaver (CVE-2025-31324) to Target Critical Infrastructures KrustyLoader SNOWLIGHT Vshell |
2025-05-13
⋅
Cisco Talos
⋅
Defining a new methodology for modeling and tracking compartmentalized threats |