Click here to download all references as Bib-File.•
| 2025-07-18
⋅
Kyiv Independent
⋅
Ukrainian hackers wipe databases at Russia's Gazprom in major cyberattack, intelligence source says |
| 2025-07-18
⋅
The Record
⋅
UK sanctions Russian cyber spies accused of facilitating murders WhisperGate |
| 2025-07-17
⋅
NJCCIC
⋅
ClickFix Leading to MonsterV2 Infostealer MonsterV2 |
| 2025-07-17
⋅
⋅
Cert-UA
⋅
UAC-0001 cyberattacks on the security and defense sector using the LAMEHUG software using LLM (large language model) (CERT-UA#16039) LAMEHUG |
| 2025-07-11
⋅
Authentic8
⋅
Cyber Intel Brief: NightEagle APT, AI deepfakes, SPNEGO flaw NightEagle |
| 2025-07-07
⋅
CyberSecurityNews
⋅
NightEagle APT Attacking Industrial Systems by Exploiting 0-Days and With Adaptive Malware NightEagle |
| 2025-07-02
⋅
K7 Security
⋅
@mentalpositiveās New macOS Stealer: AMOS Repackaged or a New Cyber Threat? AMOS |
| 2025-06-30
⋅
ICC
⋅
ICC detects and contains new sophisticated cyber security incident |
| 2025-06-27
⋅
axios
⋅
Prolific cybercriminal group now targeting aviation, transportation companies |
| 2025-06-24
⋅
Bridewell
⋅
2025 Cyber Threat Intelligence Report AsyncRAT Brute Ratel C4 Cobalt Strike Fog Ghost RAT Lumma Stealer Meduza Stealer Quasar RAT RedLine Stealer Sliver |
| 2025-06-21
⋅
⋅
Cert-UA
⋅
Cyberattacks UAC-0001 (APT28) in relation to public authorities using BEARDSHELL and COVENANT BEARDSHELL GRUNT SLIMAGENT |
| 2025-06-19
⋅
Government of Canada
⋅
Cyber threat bulletin: People's Republic of China cyber threat activity: PRC cyber actors target telecommunications companies as part of a global cyberespionage campaign |
| 2025-06-16
⋅
Orange Cyberdefense
⋅
From SambaSpy to Sorillus: Dancing through a multi-language phishing campaign in Europe Sorillus RAT |
| 2025-06-10
⋅
Check Point Research
⋅
CVE-2025-33053, Stealth Falcon and Horus: A Saga of Middle Eastern Cyber Espionage Horus |
| 2025-05-27
⋅
AIVD
⋅
AIVD and MIVD identify new Russian cyber threat actor |
| 2025-05-21
⋅
Microsoft
⋅
Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool Lumma Stealer |
| 2025-05-07
⋅
FBI
⋅
Cyber Criminal Services Target End-of-Life Routers to Launch Attacks and Hide Their Activities TheMoon |
| 2025-05-07
⋅
FBI
⋅
Alert Number: I-050725-PSA Cyber Criminal Proxy Services Exploiting End of Life Routers TheMoon |
| 2025-05-07
⋅
Palo Alto Networks Unit 42
⋅
Iranian Cyber Actors Impersonate Model Agency in Suspected Espionage Operation APT35 |
| 2025-05-06
⋅
NCSC Switzerland
⋅
Cybersecurity: Situation in Switzerland and internationally - Semi-Annual Report 2024/II |