Click here to download all references as Bib-File.•
2025-06-03
⋅
cocomelonc
⋅
Linux hacking part 5: building a Linux keylogger. Simple C example |
2025-05-31
⋅
The Insider
⋅
Hidden Bear: The GRU hackers of Russia’s most notorious kill squad |
2025-05-30
⋅
Censys
⋅
Tracking AyySSHush: a Newly Discovered ASUS Router Botnet Campaign |
2025-05-28
⋅
Darktrace
⋅
PumaBot: Novel Botnet Targeting IoT Surveillance Devices PumaBot |
2025-05-28
⋅
Google
⋅
Mark Your Calendar: APT41 Innovative Tactics TOUGHPROGRESS |
2025-05-28
⋅
Greynoise
⋅
GreyNoise Discovers Stealthy Backdoor Campaign Affecting Thousands of ASUS Routers |
2025-05-27
⋅
AIVD
⋅
Unknown Russian group behind hacks Dutch targets Void Blizzard |
2025-05-27
⋅
Microsoft
⋅
New Russia-affiliated actor Void Blizzard targets critical sectors for espionage Void Blizzard |
2025-05-27
⋅
AIVD
⋅
AIVD and MIVD identify new Russian cyber threat actor |
2025-05-26
⋅
Yonhap News Agency
⋅
Investigation into SK Telecom data breach expands to KT, LG Uplus: sources BPFDoor |
2025-05-23
⋅
TechCrunch
⋅
Mysterious hacking group Careto was run by the Spanish government, sources say Careto Careto |
2025-05-22
⋅
Recorded Future
⋅
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Documents CHERRYSPY HATVIBE |
2025-05-22
⋅
Recorded Future
⋅
Russia-Aligned TAG-110 Targets Tajikistan with Macro-Enabled Word Templates CHERRYSPY HATVIBE |
2025-05-21
⋅
Microsoft
⋅
Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool Lumma Stealer |
2025-05-21
⋅
Bleeping Computer
⋅
Russia to enforce location tracking app on all foreigners in Moscow |
2025-05-20
⋅
European Council
⋅
Russian hybrid threats: EU lists further 21 individuals and 6 entities and introduces sectoral measures in response to destabilising activities against the EU, its member states and international partners |
2025-05-20
⋅
⋅
Kaspersky
⋅
https://securelist.ru/purerat-attacks-russian-organizations/112619/ PureLogs Stealer |
2025-05-20
⋅
Acronis
⋅
From banks to battalions: SideWinder’s attacks on South Asia’s public sector |
2025-05-19
⋅
The DFIR Report
⋅
Another Confluence Bites the Dust: Falling to ELPACO-team Ransomware Mimic Ransomware MimiKatz |
2025-05-19
⋅
GitHub - Adaptix-Framework//AdaptixC2 AdaptixC2 |