Click here to download all references as Bib-File.•
2025-04-15
⋅
sysdig
⋅
UNC5174’s evolution in China’s ongoing cyber warfare: From SNOWLIGHT to VShell SNOWLIGHT Sliver Vshell |
2025-04-15
⋅
SecurityWeek
⋅
China Pursuing 3 Alleged US Operatives Over Cyberattacks During Asian Games |
2025-04-12
⋅
CyberSecurity88
⋅
Algeria’s Ministry of Pharmaceutical Industry Data Leaked in Retaliatory Cyberattack MORH4x |
2025-04-09
⋅
Resecurity
⋅
Cybercriminals Attacked National Social Security Fund of Morocco - Millions of Digital Identities at Risk of Data Breach Jabaroot |
2025-04-09
⋅
NCSC UK
⋅
Advisory: BADBAZAAR and MOONSHINE: Technical analysis and mitigations badbazaar |
2025-04-09
⋅
NCSC UK
⋅
Advisory: BADBAZAAR and MOONSHINE: Spyware targeting Uyghur, Taiwanese and Tibetan groups and civil society actors badbazaar |
2025-04-09
⋅
NCSC UK
⋅
NCSC and partners share guidance for communities at high risk of digital surveillance badbazaar |
2025-04-07
⋅
SOC Prime
⋅
UAC-0226 Attack Detection: New Cyber-Espionage Campaign Targeting Ukrainian Innovation Hubs and Government Entities with GIFTEDCROOK Stealer GIFTEDCROOK UAC-0226 |
2025-04-06
⋅
Gridinsoft
⋅
How to Remove Lilith RAT: Complete Removal Guide Lilith puNK-003 |
2025-04-03
⋅
SOC Prime
⋅
UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL WRECKSTEEL UAC-0219 |
2025-04-03
⋅
SOC Prime
⋅
UAC-0219 Attack Detection: A New Cyber-Espionage Campaign Using a PowerShell Stealer WRECKSTEEL WRECKSTEEL |
2025-04-01
⋅
⋅
Cert-UA
⋅
UAC-0219: Cyber espionage using PowerShell stealer WRECKSTEEL (CERT-UA#14283) WRECKSTEEL UAC-0219 |
2025-03-25
⋅
Inside Kimsuky’s Latest Cyberattack: Analyzing Malicious Scripts and Payloads |
2025-03-14
⋅
Twitter (@CERTCyberdef)
⋅
Tweet on Emmenhtal v3 Emmenhtal Lumma Stealer Rhadamanthys |
2025-03-11
⋅
Juniper Networks
⋅
The RedPenguin Malware Incident tsh |
2025-03-10
⋅
Cybershafarat
⋅
DieNet and #Shiite_Harvest claimed responsibility for disabling ten significant Iraqi websites DieNet |
2025-03-06
⋅
⋅
Orange Cyberdefense
⋅
Dossier Bybit : Le plus gros hack de l’histoire de la finance |
2025-03-05
⋅
CyberScoop
⋅
Investigator says differing names for hacker groups, hackers studying investigative methods hinders law enforcement |
2025-02-28
⋅
Intel 471
⋅
Black Basta exposed: A look at a cybercrime data leak Black Basta Black Basta |
2025-02-27
⋅
Microsoft
⋅
Disrupting a global cybercrime network abusing generative AI Storm-2139 |