Click here to download all references as Bib-File.•
2025-06-11
⋅
Interpol
⋅
20,000 malicious IPs and domains taken down in INTERPOL infostealer crackdown |
2025-06-09
⋅
Sentinel LABS
⋅
Follow the Smoke | China-nexus Threat Actors Hammer At the Doors of Top Tier Targets GOREshell Nimbo-C2 ShadowPad |
2025-06-05
⋅
Hunt.io
⋅
Abusing Paste.ee to Deploy XWorm and AsyncRAT Across Global C2 Infrastructure AsyncRAT XWorm |
2025-06-05
⋅
FBI
⋅
Alert Number: I-060525-PSA - Home Internet Connected Devices Facilitate Criminal Activity BADBOX |
2025-06-05
⋅
Cisco Talos
⋅
Newly identified wiper malware “PathWiper” targets critical infrastructure in Ukraine PathWiper |
2025-06-05
⋅
Mobile-Hacker
⋅
Analysis of Spyware That Helped to Compromise a Syrian Army from Within SpyMax |
2025-06-03
⋅
cocomelonc
⋅
Linux hacking part 5: building a Linux keylogger. Simple C example |
2025-05-31
⋅
The Insider
⋅
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad |
2025-05-30
⋅
Censys
⋅
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign |
2025-05-28
⋅
Darktrace
⋅
PumaBot: Novel Botnet Targeting IoT Surveillance Devices PumaBot |
2025-05-28
⋅
Google
⋅
Mark Your Calendar: APT41 Innovative Tactics TOUGHPROGRESS |
2025-05-28
⋅
Greynoise
⋅
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers |
2025-05-27
⋅
AIVD
⋅
Unknown Russian group behind hacks Dutch targets Void Blizzard |
2025-05-27
⋅
Microsoft
⋅
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage Void Blizzard |
2025-05-27
⋅
AIVD
⋅
AIVD and MIVD identify new Russian cyber threat actor |
2025-05-26
⋅
Yonhap News Agency
⋅
Investigation into SK Telecom data breach expands to KT, LG Uplus: sources BPFDoor |
2025-05-23
⋅
TechCrunch
⋅
Mysterious hacking group Careto was run by the Spanish government, sources say Careto Careto |
2025-05-22
⋅
Recorded Future
⋅
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents CHERRYSPY HATVIBE |
2025-05-22
⋅
Recorded Future
⋅
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Templates CHERRYSPY HATVIBE |
2025-05-21
⋅
Microsoft
⋅
Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool Lumma Stealer |