Click here to download all references as Bib-File.•
| 2025-12-09
⋅
CISA
⋅
Pro-Russia Hacktivists Conduct Opportunistic Attacks Against US and Global Critical Infrastructure |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Environmental Protection Agency
⋅
Foreign National Indicted and Extradited to the United States for Role in Two Russia-Linked Cyber Hacking Groups |
| 2025-12-09
⋅
Department of Justice
⋅
Justice Department Announces Actions to Combat Two Russian State-Sponsored Cyber Criminal Hacking Groups |
| 2025-12-09
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious PNG Files |
| 2025-12-09
⋅
Reverse The Malware
⋅
Debunking a Malware Technique That Bypasses Binwalk Using dd |
| 2025-12-09
⋅
BlackPoint
⋅
Snakes in the Castle: Inside the Walls of Python-Driven CastleLoader Delivery CASTLELOADER |
| 2025-12-09
⋅
Huntress Labs
⋅
AMOS Stealer Exploits AI Trust: Malware Delivered Through ChatGPT and Grok AMOS |
| 2025-12-08
⋅
sysdig
⋅
EtherRAT: DPRK uses novel Ethereum implant in React2Shell attacks EtherRAT |
| 2025-12-08
⋅
Kroll
⋅
New AMOS Infection Vector Highlights Risks around AI Adoption AMOS |
| 2025-12-08
⋅
Trend Micro
⋅
AI-Automated Threat Hunting Brings GhostPenguin Out of the Shadows GhostPenguin |
| 2025-12-08
⋅
Swisscom B2B CSIRT
⋅
Swisscom B2B CSIRT - TDR Intel Brief: Unmasking Amadey 5 Amadey |
| 2025-12-07
⋅
Reverse The Malware
⋅
From Pixels to Payloads: Understanding Malicious BMP Files |
| 2025-12-04
⋅
Amazon
⋅
China-nexus cyber threat groups rapidly exploit React2Shell vulnerability (CVE-2025-55182) |
| 2025-12-04
⋅
Aryaka Networks
⋅
Scam in the Cloud How Fraudsters Exploit Google Cloud Storage (GCS) for Deceptive Campaigns |
| 2025-12-04
⋅
CrowdStrike
⋅
Unveiling WARP PANDA: A New Sophisticated China-Nexus Adversary BRICKSTORM |
| 2025-12-04
⋅
CISA
⋅
Malware Analysis Report (MAR) BRICKSTORM Backdoor BRICKSTORM |
| 2025-12-02
⋅
⋅
Positive Technologies
⋅
(Ex)Cobalt. A review of the group's tools in attacks for 2024-2025 PUMAKIT |
| 2025-12-02
⋅
Zscaler
⋅
Shai-Hulud V2 Poses Risk To NPM Supply Chain Shai-Hulud |
| 2025-12-02
⋅
Synthient
⋅
IPCola: A Tangled Mess Gaganode Gaganode Gaganode |