Click here to download all references as Bib-File.•
| 2025-06-04
⋅
Google
⋅
The Cost of a Call: From Voice Phishing to Data Extortion UNC6040 |
| 2025-05-29
⋅
Elastic
⋅
Chasing Eddies: New Rust-based InfoStealer used in CAPTCHA campaigns EDDIESTEALER |
| 2025-05-21
⋅
Trendmicro
⋅
TikTok Videos Promise Pirated Apps, Deliver Vidar and StealC Infostealers Instead Stealc Vidar |
| 2025-05-07
⋅
FBI
⋅
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers TheMoon |
| 2025-04-30
⋅
Seqrite
⋅
Advisory: Pahalgam Attack themed decoys used by APT36 to target the Indian Government Crimson RAT |
| 2025-04-29
⋅
Nextron Systems
⋅
Nitrogen Dropping Cobalt Strike – A Combination of “Chemical Elements” Cobalt Strike Nitrogen Loader |
| 2025-04-28
⋅
SentinelOne
⋅
Top Tier Target | What It Takes to Defend a Cybersecurity Company from Today’s Adversaries PurpleHaze |
| 2025-04-16
⋅
SpyCloud
⋅
Exposed Credentials & Ransomware Operations: Using LLMs to Digest 200K Messages from the Black Basta Chats Black Basta Black Basta |
| 2025-04-08
⋅
Trustwave
⋅
A deep Dive into the Leaked Black Basta Chat Logs Black Basta Black Basta |
| 2025-03-31
⋅
Trend Micro
⋅
The Espionage Toolkit of Earth Alux: A Closer Look at its Advanced Techniques Godzilla Webshell Cobalt Strike FINALDRAFT RAILSETTER Earth Alux |
| 2025-03-22
⋅
Trend Micro
⋅
Back to Business: Lumma Stealer Returns with Stealthier Methods Lumma Stealer |
| 2025-03-18
⋅
Expel
⋅
Code-signing certificate abuse in the Black Basta chat leaks (and how to fight back) Black Basta Black Basta |
| 2025-03-12
⋅
Youtube (AhmedS Kasmani)
⋅
Initial Analysis of Black Basta Chat Leaks Black Basta Black Basta |
| 2025-03-11
⋅
Hunt.io
⋅
JSPSpy and ‘filebroser’: A Custom File Management Tool in Webshell Infrastructure |
| 2025-03-11
⋅
Trend Micro
⋅
AI-Assisted Fake GitHub Repositories Fuel SmartLoader and LummaStealer Distribution Lumma Stealer SmartLoader |
| 2025-03-06
⋅
Medium SarvivaMalwareAnalyst
⋅
XWorm Attack Chain: Leveraging Steganography from Phishing Email to Keylogging via C2 Communication XWorm |
| 2025-03-05
⋅
eSentire
⋅
Initial Takeaways from the Black Basta Chat Leaks Black Basta Black Basta |
| 2025-02-28
⋅
Positive Technologies
⋅
The evolution of Dark Caracal tools: analysis of a campaign featuring Poco RAT Bandook |
| 2025-02-28
⋅
Intel 471
⋅
Black Basta exposed: A look at a cybercrime data leak Black Basta Black Basta |
| 2025-02-15
⋅
⋅
Youtube (greenplan)
⋅
[BINARY REFINERY] (Emmenhtal) - Deobfuscation of a custom obfuscation algorithm Emmenhtal |